0% found this document useful (0 votes)
261 views2 pages

EXACKTs Ethical Hacking Cyber Security

The 75-hour course provides training in ethical hacking and cyber security. It aims to help learners understand fundamentals of ethical hacking as well as concepts like denial of service attacks, viruses, SQL injection, and cyber security. The training is certified by EXACKT TECHFLEETERS PVT LTD in association with HPE and includes free study materials. Topics covered include network fundamentals, information gathering, hacking Windows and Linux systems, social engineering, and cyber crime case studies.

Uploaded by

Nagaraj KT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
261 views2 pages

EXACKTs Ethical Hacking Cyber Security

The 75-hour course provides training in ethical hacking and cyber security. It aims to help learners understand fundamentals of ethical hacking as well as concepts like denial of service attacks, viruses, SQL injection, and cyber security. The training is certified by EXACKT TECHFLEETERS PVT LTD in association with HPE and includes free study materials. Topics covered include network fundamentals, information gathering, hacking Windows and Linux systems, social engineering, and cyber crime case studies.

Uploaded by

Nagaraj KT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

(Authorized Delivery Partner for HPE)

Course Datasheet

Ethical Hacking & Cyber Security


Module Code (ECTF-HPE-EHCS-v1)
Course Length: 75 Hours

Course Objective
The 75 hours comprehensive training program will help a learner to understand the fundamentals of ethical hacking
followed by understanding concepts like DOS, viruses, SQL injection and Cyber Security.

Certification by: EXACKT TECHFLEETERS PVT LTD in association with HPE

Other Benefits: Free Study Material for each

CEH – Module 1
Network Concept Need & Advantage of Virtualization
▪ What is Network? • Requirements for virtualization
▪ What is IP and types? • Creating virtual machines and optimization
▪ Network Topology; Internet working performance
▪ Domain Name; Server • Installing OS (Windows and Linux) On Virtual
▪ Ports and Types of Ports Machines
▪ Introduction to Web Browser • Virtual networking what and why?
Ethical Hacking & Cyber Security & Overview
▪ Cybercrime scenario in India and worldwide Information Gathering
▪ Short description about hacking vs. Ethical • What Is Information Gathering & Why Hackers
hacking Need This?
▪ Skill Profile of a Hacker • Types of Information Gathering
▪ Some Famous Hackers and Groups • Information Gathering Using Websites
▪ Cyber World • Information Gathering Using Software
▪ Advantage and Disadvantage of Cyber world • Search Engines- Smart Way of Information
▪ Types of Hackers; Classes of Hacker Gathering
▪ Security Challenges • Ping; Who-is-Lookup;PeopleSearch; DNS Lookup
▪ Skills required for an Ethical Hacker • Benefits of Foot printing
Overview of Cyber Law Windows, Linux hacking & Security
▪ Cyber Laws Indian
• Introduction Windows Security
▪ Technical Aspect of Indian Cyber Law
• User Accounts Security, Attacks and
▪ IT ACT 2000 & 2008
countermeasure
▪ Internet Crimes and Frauds
• Hacking into System by Changing Passwords
▪ Cyber Law Cases in India
• Getting Access to System by Elevating Privileges
▪ Organization Under Cyber Laws
• Finding Out the Passwords of Windows
▪ Advantages of Cyber Laws
• Bypassing the Windows Security
▪ Computer virtualization technology & lab setup
Page 1 of 2
E-Mail: [email protected] W: www.techfleeters.com
Contact: +919024640640 FB: www.fb.com/techfleeters
• Data recovery SQL Injection
• Steganography and cryptography • SQL Injection Attacks
• Desktop exploitation & data hiding • How Web Applications Work?
• Fake calling & SMS • SQL Injection Detection
Mobile Phone • Types of SQL Injection
• Use of mobile in hacking • How to Defend Against SQL Injection Attacks?
• Hidden function of mobile; Backdoor Attack Wireless Hacking
Denial of Service Attack (DOS – attack) • Wireless Standards
• What is a Denial of Service Attack? • Common Vulnerabilities in Wireless Devices
• What is Distributed Denial of Service Attacks? • Encryption Standards Used in Wi-Fi
• DoS Attack Techniques • WEP Cracking
• Detail Study on DoS Attack Tools • WPA/WPA2 Cracking
Hacking by Viruses, Trojans, Key Loggers • WPS Cracking
• What is virus? What is Trojan? • Solve Security challenges
• Trojans/viruses Attack Linux Training
• Different way a Trojan can get into a system • What is Linux & how to operate this OS
• How Attacker Bypass Your Antivirus by Trojans • Use of Linux
VPN Technology • Wi-Fi cracking & security
• Proxy and Types of Proxies • Pen-testing (Site Cloning)
• Why Hackers Use Proxy? • Network Find
• How to Hide IP Address While Chatting • Network scanning
• How to Open Blocked Websites • DNS Hacking (Server hacking)
• Convert Your Machine as Proxy Server with • What is DNS.??
HTTPS Proxy • DNS Attack
• Advantage and Disadvantage of Proxy • FACEBOOK/Any Mail id HACKED!!!
• How Proxy Hack Your Passwords Etc. • Security
• What Is VPN? Why We Use VPN? • Wi-Fi jammer
• Free VPN • Armitage
• NMAP
E-mail/Social Sites Hacking and Security Issues • Terminal Function
• Analysis Email Attacks (Live Demo) Manually & Security
Automatic • Facebook/mail Account Security
• Cookies Stealing (Session Hijacking) of All Big • WhatsApp Security
Mail Servers • Android phone Security
• Phishing Attacks (Normal & Advanced) Cyber Crime: Case Study
• Analyzing Fake & Real Profiles & Email Accounts • Introduction to cyber-crime and investigation
• Fake Mailing Attack • Types of cyber crimes
• Email & Fake Profile Tracing • Investigation Rules
• Facebook Phishing Attacks
• Facebook Account security with Email & SMS
Notification

How to Apply?
• Just log-on to www.techfleeters.com/apply and fill the form
• After successful submission of the application form, make a payment of minimum INR 1,000/- to the
given payment links on the page or the link: www.techfleeters.com/pay
• Share the screenshot or the transaction Id of the payment to [email protected]
Page 2 of 2
E-Mail: [email protected] W: www.techfleeters.com
Contact: +919024640640 FB: www.fb.com/techfleeters

You might also like