0% found this document useful (0 votes)
250 views3 pages

Hacking Course Plan 1

The document outlines the topics that will be covered in a 16-hour ethical hacking workshop level 1. The workshop will cover concepts like cyber ethics, different types of hackers, information gathering techniques, hacking wireless networks and routers, mobile and VoIP hacking, web application attacks like SQL injection and XSS, system and network hacking, email hacking, and an introduction to cyber crime investigation. Hands-on demonstrations of hacking techniques will be provided on real websites. Participants will receive free course materials including an ethical hacking toolkit.

Uploaded by

Pankaj Sharma
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
250 views3 pages

Hacking Course Plan 1

The document outlines the topics that will be covered in a 16-hour ethical hacking workshop level 1. The workshop will cover concepts like cyber ethics, different types of hackers, information gathering techniques, hacking wireless networks and routers, mobile and VoIP hacking, web application attacks like SQL injection and XSS, system and network hacking, email hacking, and an introduction to cyber crime investigation. Hands-on demonstrations of hacking techniques will be provided on real websites. Participants will receive free course materials including an ethical hacking toolkit.

Uploaded by

Pankaj Sharma
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Details of Ethical Hacking Workshop Level 1

Discover the hacker in you as you dive into the exciting realms of ethical hacking and unearth loopholes in mobile networks, social networking and e-mail websites, all this only to be topped by learning how to hack your own mail accounts and mobile networks! The concepts to be covered in the workshop are: Cyber Ethics Hackers & hacking methodologies Types of hackers Communities of Hackers Malicious Hacker Strategies Steps to conduct Ethical Hacking Hiding your identity while performing attacks Information Gathering and Scanning methodologies Get to know how hacker gather information about victim on internet Information gathering of websites & networks Scanning & Structuring of websites Finding Admin Panel of websites Trojans & Backdoors How to control victims computer using Trojans Binding Trojans with another file Undetection process of Trojans from Antivirus Removal of Trojans from your computer Analysis of Trojans/Virus Google Hacking Using Google as hacking tool Advanced operators of Google Finding Vulnerable websites using Google Finding Target networks using Google Wireless Hacking & Security Wireless Protocols Wireless Routers-Working Attacks on Wireless Routers Cracking Wireless routers password(WEP) Securing routers from Hackers Countermeasures

Mobile, VoIP Hacking & Security SMS & SMSC Introduction SMS forging & countermeasures Sending & Tracking fake SMSes VoIP Introduction Installing VoIP Server Forging Call using VoIP Web Application Attacks Web Application Overview Web Application Attacks OWASP Top 10 Vulnerabilities Putting Trojans on websites SQL injection attacks Executing Operating System Commands Getting Output of SQL Query Getting Data from the Database Using ODBC Error Message How to Mine all Column Names of a Table How to Retrieve any Data How to Update/Insert Data into Database SQL Injection in Oracle SQL Injection in MySql Database Attacking Against SQL Servers SQL Server Resolution Service (SSRS) SQL Injection Automated Tools Blind SQL Injection Preventing SQL Injection Attacks XSS attacks Finding & Fixing XSS in websites Local File inclusion attacks Remote file inclusion attacks Buffer Overflow attacks Session Hijacking attacks 20 Hands on Demonstrations on real websites

System and Network Hacking Hacking Administrators password Enumeration of networks Use of Sniffers to sniff network data. Email Hacking Making fake pages How to use keyloggers to hack mail ids Social Engineering Techniques Introduction to Cyber Crime Investigation Types of Cyber Crimes Report Cyber Crimes Investigation Methodologies Different Logging Systems Investigating Emails ( Email Tracing) Ahmedabad Bomb Blasts Terror Mail case study Investigating Phishing Cases Investigating Data Theft Cases Investigating Orkut Profile Impersonation Cases Cyber Law & IT Act, 2000 Difficulty Handling Session and Exam Total workshop duration: 16 hours The following course material will be given FREE to all registered participants of this workshop: Comprehensive course material Ethical hacking toolkit containing: Hacking tools Videos Ebooks Presentations

You might also like