0% found this document useful (0 votes)
156 views17 pages

3 Months E-Learning 3 Months Internship

The document outlines a 6-month ethical hacking program with 3 months of e-learning and 3 months of internship. It introduces ethical hacking as an authorized attempt to gain unauthorized access to a system to test its security. The program tutor is described as an entrepreneur and cyber security expert with experience teaching hundreds of students and professionals topics like networking, Linux, scanning, vulnerability assessment, exploitation, and web application penetration testing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
156 views17 pages

3 Months E-Learning 3 Months Internship

The document outlines a 6-month ethical hacking program with 3 months of e-learning and 3 months of internship. It introduces ethical hacking as an authorized attempt to gain unauthorized access to a system to test its security. The program tutor is described as an entrepreneur and cyber security expert with experience teaching hundreds of students and professionals topics like networking, Linux, scanning, vulnerability assessment, exploitation, and web application penetration testing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

ETHICAL

HACKING

6 Months Program
3 Months E-Learning
3 Months Internship

Education for a Job


What is Ethical Hacking?
Computer security expert, who specializes in penetration testing and in other testing
methodologies that ensures the security of an organization's information systems.

Ethical hacking involves an authorized attempt to gain unauthorized access to a


computer system, application, or data.

Tutor Details

Mr. Gangadharan is a Young Indian Entrepreneur, Ethical


Hacker, and Cyber Security Expert. He is a well-known figure
in the Business Cyber-security Industry and an
accomplished Cyber Security Consultant. He is well-versed in
the most up-to-date commercial hacking tools, methods,
techniques, and methodologies, as well as methodology for
ethical hacking. He prefers that people appreciate
technology than study it. His attitude toward helping the Gangadharan
country was not motivated by personal gain. He is a Web and Application
Penetration Testing expert as well as a Cybersecurity Analyst. He has taught
approximately 500 students and 200 professionals. He now works as a Cyber Security
Consultant for a number of firms.

Ethical
Education for a Job Hacking
Ethical Hacking
INTRODUCTION TO ETHICAL HACKING
Introduction to Ethical Hacking

Kali Linux Installation

NETWORKING BASICS
Networking-Electricity in Computing

Networking Layers

LINUX BASICS
Learning Linux Part-1

Learning Linux Part-2

Building our Lab

Ethical Hacking Methodology

DATA INTELLIGENCE
Passive Information Gathering

OSINT-Malt ego
OSINT-Recon
OSINT-the Harvester
031104113
312832230

OSINT-Shodan
001020011

031104113
312832230
DNS-Enumeration
001020011
301001010

DNS-Zone Transfer
031010020

031104113
312832230

Google Dorks
001020011
301001010
031010020

Dare & Milestones

SCANNING
Introduction and NMAP
NMAP Basic Scanning

Ethical
Education for a Job Hacking
NMAP Multiple Targets

TCP Connect Scan

Stealth Scan

ACK Probe

Service and OS Detection

Aggressive Scanning

UDP Scanning

NMAP Output

Docker

Web map

Introduction to Scripting

VULNERABILITY ASSESSMENT
Introduction to Vulnerability

VALC-Vulnerability Assessment
Life Cycle
Using NMAP to Find Vulnerability

Ethical
Education for a Job Hacking
NESSUS
NESSUS

EXPLOITATION
Introduction to Exploitation

Exploitation Box

Manual Exploitation

Reverse Shell and Bind Shell

Staged and Non-Staged Payloads

Automatic Exploitation

STEGANOGRAPHY
Introduction to Steganography
Technical Steganography

Linguistic Steganography

Hiding Message Using Steganography

Password Cracking

Active Online Attack

Offline Attack

Steganography and Password


Cracking Challenge

Ethical
Education for a Job Hacking
SHELL SCRIPTING
Introduction to Shell Scripting
Text Editor
Naming & Permission of
Shell Script
Shell Scripting-Hello World
Shell Scripting-Why?

User Defined Variables

System Variables

Command Line Argument

Read Command
Command Substitution

For Loop

Functions

While Loop
Until Loop

If Else Condition

Case Statement
Bash Debugging

Ethical
Education for a Job Hacking
SOCIAL ENGINEERING

Introduction to Social Engineering

Relevance of Social Engineering

Human Based Social Engineering

Computer Based Social Engineering

Phishing

Mobile Based Social Engineering

Doppelganger Domain

WEB APPLICATION PENTESTING

Introduction to Web App Pen Testing

Bug Hunting Platforms

Introduction to Recon

Enumerating Subdomains-Sublist3r

Enumerating Subdomains
-Asset Finder

Ethical
Education for a Job Hacking
Finding Live Domains

Sorting Live Subdomains


Enumerating Subdomains-
Go Buster

OWASP
Introduction to OWASP
Top 10
Injection
Manual SQL Injection
Configuring Burp Suite

Automated SQL Injection

Command Injection

Injection Prevention

Broken Authentication

Credential Stuffing

Broken Authentication-Prevention

Sensitive Data Exposure

Sensitive Data Exposure-Prevention

XML External Entities (XXE)

Insecure Direct Object Reference


(IDOR)
Ethical
Education for a Job Hacking
Security Misconfiguration

Broken Access Control

Cross Site Scripting

XSS Exploitation

Insecure Deserialization

Using Components with Known


Vulnerabilities

Insufficient Logging and Monitoring

Click Jacking

Broken Link Hijacking


Cross Site Request Forgery (CSRF)
No Rate limiting
HSTS

Server-Side Request Forgery (SSRF)

Subdomain Takeover

Report Writing

Hi, this is the New Challenge


Crack the VM

Ethical
Education for a Job Hacking
WEB APPLICATION PENTEST

Introduction
Xampp Installation
Lab Configuration
Hack Bar Installation
SQL Injection
XSS
Reflected XSS
Stored XSS
HTML Injection
Reflected HTML Injection

Stored HTML Injection


CSRF
SSRF
File Upload
LFI
RFI
Command Injection
Sensitive Information Exposure
Sensitive Information Exposure (Level 1)
Sensitive Information Exposure (Level 2)
Ethical
Education for a Job Hacking
No Rate Limit
IDOR
Broken Access Control
Broken Authentication
Parameter Tampering
Security Misconfiguration
Open Redirect
Host Header Injection
Insecure Deserialization
Final Conclusion

WINDOWS NET RESERVES ENGINEERING

Setting Lab
Downloading Necessary Software
and Tools
Patching Level (1-10) Crackme
Conclusion
CRYPTOGRAPHY
Introduction to Cryptography
Objectives of Cryptography
Types of cryptography
Encoding & Decoding
symmetric key encryption
Working of DES
Ethical
Education for a Job Hacking
Asymmetric Key Cryptography
E-mail Encryption
Hashing
Checking File Integrity
SSH
Cryptanalysis
SSL
Cryptanalysis_ practical
Disk Encryption

WEB PRESENCE

Network Insecurity
Sniffing & Spoofing

Spoofing, crypto, and Wi-Fi

NETWORK PENTESTING
Introduction to Network Pen testing

Network Basics

Connecting a Wireless Adapter to Kali


What is MAC Address & How to
Change It?

Ethical
Education for a Job Hacking
ANDROID PENTESTING

Introduction to Android

Android Architecture

Android App Structure Intents

Android App Structure-Broadcast Receive

LAB SETUP
Setting up GenY motion

Connecting GenY motion with Burp suite ERROR

Jadx setup

Dozer Setup

OWASP TOP 10
M1: Improper Platform Usage
M2: Insecure Data Storage
User Name
M3: Insecure Communication
M4: Insecure Authentication
e
User Name User Nam

M5: Insufficient Cryptography


M6: Insecure Authorization
M7: Client Code Quality
M8: Code Tampering
M10: Extraneous Functionality
Reversing APK -1
Reversing APK -2

Ethical
Education for a Job Hacking
STATIC ANALYSIS
Hardcoding Issues
MobSF Setup
MobSF Static Analysis

DYNAMIC ANALYSIS
Dynamic Analysis Using Logcat
Dynamic Analysis Using Dozer
(SQL Injection)
No Rate Limiting Attack
Dynamic Analysis Using MobSF
Editing Strings

Ethical
Education for a Job Hacking
Course Structure
3 months E-Learning
3 months Internship
Live Session for Doubt Clearance (Monday to Friday 10 AM to 7 PM)
100% Placement Assistance

Certification

This is to certify that


Mr./Ms. ................................... having Registration Number 1182741455
has successfully completed skill training in ...........................................................
Certificate is issued on ............................

AVODHA Course Completion Certficate EC-COUNCIL CERTIFIED ETHICAL HACKER

EC-COUNCIL ASSOCIATE CERTIFICATION

Fees Structure

Admission Fee : 2,800 Total


Fee : 12,800

Avodha provides Job-oriented courses in an affordable price. The total price of our
course is 12,800/- ; but to avail the course, he/she has to pay only 2,800/- as an
admission fee & rest of the amount 10,000/- has to be paid only after getting the
job related to the course he/she joined at Avodha, ie., The first installment 5,000/-
has to pay on the first day of his/her employment in a job wherein they are placed
through Avodha. And the second payment of 5,000/- needs to be done once the
student completes 30 days of employment in the Job they have been placed
via Avodha.

Ethical
Education for a Job Hacking
Our Offices

Kochi Hyderabad Mumbai


(Head Quarters)

Bangalore Chennai Delhi

Trivandrum

Ethical
Education for a Job Hacking
A product of Avodha Edu Tech Pvt. Ltd.
Education for a Job

www.avodha.com

Avodha Headquarters Trivandrum Regional Office Bangalore Regional Office

1st Floor, Carnival Infopark, 2nd Floor Asiatic Business GoodWorks Infinity Park,
Kochi Kerala - 682042 Centre Near Technopark Phase Electronics City Phase 1,
3 Campus, Kazhakkoottam, Bengaluru Karnataka - 560100
Kerala - 695582

TamilNadu Regional Office Hyderabad Regional Office Mumbai Regional Office

7th Floor, Bascon Futura SV IT Level 6, N Heights, 10th Floor, Parinee Cresenzo,
Park, Parthasarathi Puram, HITEC City, Hyderabad, Block Bandra Kurla Complex,
Chennai, Tamil Nadu - 600017 Telangana - 500081 Mumbai, Maharashtra - 400051

Delhi Regional Office

1st Floor, B-39,Connaught


Place, New Delhi, Delhi - Ethical
110001 Hacking

You might also like