Ethical Hacking
Ethical Hacking
HACKING
TRAINING PROGRAM
WWW.IGNITETECHNOLOGIES.IN
Why you should choose this course ?
Ethical hacking is a training program that assists beginners in their
first steps into the cyber security domain. By enrolling in this course,
you will learn the fundamentals of hacking, penetration testing,
network security, web application security, cloud computing, auditing,
and other topics.
WWW.IGNITETECHNOLOGIES.IN
Module 1: Ethical Hacking
WWW.IGNITETECHNOLOGIES.IN
Module 4: Recon- Foot printing Module 5: Recon- Network Scanning
WWW.IGNITETECHNOLOGIES.IN
Module 6: Recon – Enumeration
• Machine Names
• Network Share Resources an
• SMB Enumeration
• NetBIOS Enumeration
• RCP Bind Enumeration
• NAS Server Enumeration
• Application & Banners
• FTP Enumeration
• Sniffing
• Enumerating Username and Groups
• Process Enumeration
• Network Stat vs TCP View
WWW.IGNITETECHNOLOGIES.IN
Module 8: Post Exploitation & Persistence
• Post Enumeration
• Hack for Fun
• File less Attack
• Privilege Escalation
• Persistence & Its importance
• Create Permanent Backdoor
• Injecting Sticky key
Webserver Reconnaissance
• Netcraft
• Whatweb
WWW.IGNITETECHNOLOGIES.IN
Module 10: Website Hacking
• Introduction to Web Server and Application
• Lab Setup
• HTTP Method and Status Code
• Introduction to OWSAP TOP 10
• Burp Suite for Beginners
• SQL Injection
• OS Command Injections
• XSS Attack
• Web Login Brute Force Attack
WWW.IGNITETECHNOLOGIES.IN
Module 13: Cryptography & Steganography
Introduction Sniffing Its Types • Introduction of DOS Attack & Its Types
• Active Sniffing & Passive Sniffing • Distributed Denial of Service DDOS
• Spoofing • Bonet
• Man In The Middle Attack • DOS Attack
• ARP Poisoning • SYN Flood
• DNS Poisoning • ICMP Flood
Password Sniff • UDP Flood
• HTTP Password Capture • TCP Flood
• Telnet Password Capture • Blue Screen Dead Attack
• FTP Password Capture
Wireshark
WWW.IGNITETECHNOLOGIES.IN
Module 16: Evading IDS, Firewalls & Honey Pots
WWW.IGNITETECHNOLOGIES.IN