0% found this document useful (0 votes)
35 views

Advanced-Ethical-Hacking-Course

The document outlines an Advanced Ethical Hacking course offered by Chaitanya Cyber Strix Technologies, emphasizing practical, hands-on training in cybersecurity. It details various training formats, including online and offline options, and covers a wide range of topics such as networking, vulnerability assessment, and ethical hacking techniques. The course is designed for individuals with basic computer knowledge and aims to equip them with skills to identify and mitigate security vulnerabilities in real-world scenarios.

Uploaded by

km8643310
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

Advanced-Ethical-Hacking-Course

The document outlines an Advanced Ethical Hacking course offered by Chaitanya Cyber Strix Technologies, emphasizing practical, hands-on training in cybersecurity. It details various training formats, including online and offline options, and covers a wide range of topics such as networking, vulnerability assessment, and ethical hacking techniques. The course is designed for individuals with basic computer knowledge and aims to equip them with skills to identify and mitigate security vulnerabilities in real-world scenarios.

Uploaded by

km8643310
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

CYBERSECURITY- THE FUTURE

ADVANCED ETHICAL HACKING IN TELUGU


ADVANCED ETHICAL HACKING

ONLINE TRAINING OFFLINE TRAINING WORKSHOPS

E COME A
B
ER
HACK
CERTIFIED ETHICAL HACKER TRAINERS
WITH OVER 5+ YEARS OF EXPERIENCE

Contact us COURSE CONTENT


Networking
+91 81251 58604
Ethical Hacking
www.chaitanyacyberstrix.com
Vulnerability Assessment

[email protected] Advanced Ethical Hacking


It's not Bookish Hacking.
It’s Actual Hacking.
When it comes to the world of hacking, theoretical knowledge can only take you so far. In a landscape that is constantly evolving
and changing, practical, real-world experience is essential. It signifies a hands-on, experiential approach to hacking, where the
understanding of vulnerabilities and security breaches isn’t merely academic, but grounded in real-world scenarios and
practical application. This tagline asserts the importance of lived experience in the field of hacking, conveying a message of
expertise and proficiency that goes beyond mere book knowledge.

DRIVING PROGRESSION,
EMPOWERING SECURITY.
Hey there,

I'm Chaitanya 10 +
Eshwar Prasad. Years of experience

Certified Ethical Hacker


A Entrepreneur and Hacker is someone who uses their
50 +
Completed projects
programming skills and knowledge of computer systems to
gain unauthorized access to computer networks, systems, or

400 +
data.

www.chaitanyaeshwarprasad.com
Bug Bounty Rewards

Chaitanya Eshwar Prasad, a passionate cybersecurity professional and entrepreneur


based in Hyderabad, Telangana, India . I’m a India Book of Records 2023 holder. With a
deep interest in information technology and networks, I'm constantly seeking to
evolve my skills and knowledge to stay ahead of the curve. I've been passionate about
cybersecurity since the 7th grade, and I started my own company in the 10th grade. I
believe that my early exposure to the world of technology has given me a unique
perspective and valuable skills that I bring to every project.

I'm proud to be the Founder Director and CEO of Chaitanya Cyber Strix Technologies
Pvt. Ltd., a company dedicated to providing top-notch cybersecurity services, the co-
founder of Shasra Engineering and Construction Private Limited Company.

As a self-learner, I've earned several certifications in cybersecurity, including Certified


Ethical Hacker v11 (CEH), Computer Hacking Forensic Investigator v9 (CHFI), Certified
SOC Analyst (CSA), and more. I've also honed my skills in Web App Penetration Tester,
Android Penetration Tester, IoT Penetration Tester, API Penetration Tester, Thick
Client Penetration Tester, Network Penetration Tester, ISO 27001 Lead Auditor, Cloud
Security, SIEM Tool, SDR, and Automotive Security.

In addition to my technical expertise, I'm also a PHP programmer, pencil sketch artist,
graphic designer, professional badminton player, and digital marketer. At work, I'm
expressive, innovative, and capable, always striving to provide the best solutions for
my clients. I'm excited to continue learning, growing, and making a difference in
cybersecurity. Let's connect and collaborate!
COURSE PREREQUISITES

No Coding Required.
Basic knowledge of Computer Systems.
One year in an information security role or equivalent experience is beneficial.
Ability to read and understand PHP code will help, although it is not mandatory.

CLASSROOM TRAINING

When it comes to quality instruction in a classroom training experience a more


stimulating learning environment with our optimized mix of lecture, hands-on
practice, when you have doubts our instructors are available to clear and ensure you
comprehend the course and knowledge.

ONLINE TRAINING

We are providing training through Online LIVE with a real time live instructor. The
live instructor teaches the course and provides the opportunity for students to ask
live questions via voice or instant message during the live training event with
practicals

WORKSHOPS

We conduct workshops and seminars in Information Security. Ethical Hacking &


Information Security Workshop will teach you how to protect yourself from the cyber
attacks and make yourself come to know how to secure your organization from
hackers.
What is this Course about ?
Advanced Ethical Hacking
Ethical hacking is the practice of testing
computer systems, networks, or web
applications for security vulnerabilities
with the permission of the system
owner. It involves simulating real-world
cyber attacks to identify weaknesses
that malicious actors could exploit.

Modules Covered - Ethical Hacking Course


SNIFFING Wireless Hacking
KALI LINUX

Malware
Hacker Lab

OSI Model
Vulnerability

Cryptography password Cracking

METASPLOIT
NMAP SCANNING

System Hacking

OWASP TOP 10
Basics of Networking

DOS/ DOS Attack

PROTOCOLS
NET CAT ETHICAL HACKING

FOOT PRINTING Mobile Hacking

Social Engineering
Webserver Hacking
What will you learn?
10+ hacking tools such as Metasploit, Aircrack-ng, SQLmap, etc.
30+ hands-on real-life hacking examples.
No prior knowledge required
Hack & secure WiFi & wired networks.
Hack servers.
Create backdoors & Hack Windows.
Start from 0 up to a high-intermediate level.
Discover & exploit web application vulnerabilities to hack websites.
Learn Network Hacking / Penetration Testing.
Learn about the different hacking fields & hackers.
Install a hacking lab & needed software (on Windows, OS X and Linux).
Discover vulnerabilities & exploit them to hack into servers.
Hack secure systems using client-side & social engineering.
Secure systems from all the attacks shown.
Install & use Kali Linux - a hacking operating system.
Linux basics.
Linux commands
How to use the Linux terminal.
Network basics & how devices interact inside a network.
Run attacks on networks without knowing its key.
Control Wi-Fi connections without knowing the password.
Create a fake Wi-Fi network with internet connection & spy on clients.
Crack WEP/WPA/WPA2 encryptions.
ARP Spoofing / ARP Poisoning.
Launch various Man In The Middle attacks.
Access any account accessed by any client on the network.

Sniff network traffic & analyse it to extract important info such as:
passwords, cookies, urls, videos, images ..etc.
Intercept network traffic & modify it on the fly.
Discover devices connected to the same network.
Inject Javascript in pages loaded by clients connected to the
same network.
Redirect DNS requests to any destination (DNS spoofing).
Secure networks from the discussed attacks.
Edit router settings for maximum security.
Discover suspicious activities in networks.
How to prevent MITM attacks.
Discover open ports, installed services and vulnerabilities on
computer systems.
Exploit buffer over flows & code execution vulnerabilities to gain
control over systems.
Hack systems using client side attacks.
Hack Windows using fake updates.
Backdoor normal programs.
Backdoor any file type such as pictures, pdf's ...etc.
Gather information about people, such as emails, social media
accounts, emails and friends.
Hack secure systems using social engineering.
And many More ...
NETWORKING

Introduction to Networking
Types of Networks
UDP
TCP/IP
TCP/IP Three-Way Handshake
TCP Flags
Network & Networking
Network Types
Network Topologies
Network Devices
Internet
Intranet
Extranet
IP Address
Subnet Mask
HTTP & WWW
HTTP Request Methods
HTTP Response Codes

OSI Model (Open System Interconnection)


1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Data-Link Layer
7. Physical Layer
ADVANCED ETHICAL HACKING

Hacker Lab Setup


VMware Setup in PC
Kali Linux Installation in Virtualbox
Metasploitable – Vulnerable Web Server
DVWA Setup

Kali Linux for Hackers


Introduction to Kali Linux (Theory)
History of Kali Linux (Theory)
Linux Distribution (Theory)
Kernel (Theory)
Shell (Theory)
Linux File System (Theory)
Kali Linux Installation in Virtual Box
Linux Repositories (/etc/apt/sources.list)
Command Line Interface (Explanation)
Root User (sudo su)
Install & Uninstall
Commands
Users & Groups
Permissions
Local Server (File Sharing Through LAN)

Introduction to Ethical Hacking


Cyber Kil1 Chain Methodology
CIA Triad
5 Phases of Ethical H4ck1ng
Types of Hackers
Security Researchers, Analysts, Auditors etc...
ADVANCED ETHICAL HACKING

Information Gathering (Footprinting)


Who is
Virus total
Shodan
GHDB (Google Hacking Data Base)
The Harvester tool
Nikto Tool
Information Gathering from Social Media
Maltego - Advanced tool
Image Metadata
Sublist3r
Dmitry
Wappalyzer Extension
Netcraft

NMAP Scanning (Network Scanning)


Network Scanning with NMAP
Server Scanning with NMAP
Host Discovery
Port Discovery
Service Version Detection
OS Discovery

Anonymity
Dark web, Deep web and Surface web
VPN (Virtual Private Networks)
Proxy Chains
Tor Browser, Onion url etc..
ADVANCED ETHICAL HACKING

Net Cat (Powerful tool for pentesters)


Port Scanning with Netcat (TCP and UDP)
Chatting between two users (Initiator and listener)
Banner grabbing (FTP and SSH) with Netcat
File Transfer with Netcat
Grabbing the HTTP Banner
Windows Reverse Connection

Metasploit (Pentester Tool)


Server Enumeration with Metasploit
Detail Explanation of Modules
1. Exploit Module
2. Payload Module
3. Auxiliaries Module
4. Encoder Module
5. Evasions Module
6. Post Module
Exploiting the Victim Machine
Setting up LHOST and RHOST to get access
Creating a payload using msfvenom

Web Server Hacking


Scanning with NMAP
Using Searchsploit tool for finding CVE
Finding the exploit in Rapid7
Using Pen testing tool (Metasploit)
FTP Service Scanning
VSFTPD Exploitation
ADVANCED ETHICAL HACKING

BeEF (Browser Exploitation Framework)


What is the Browser Exploitation Framework?
Create a link with beef
Exploit the web browser
Advancement of Tool
Ngrok Configuration with beef
Performing exploitation in LAN Connection
Performing exploitation in WAN Connection
JavaScript hook port forwarding URL

Malware
What is Malware and its Types?
What is Spyware?
What is Worms?
What is Trojans?
What is Viruses?
What is Ransomware?

Vulnerability Analysis
What are Vulnerabilities?
OWASP ZAP Tool
Nessus Application
Scanning the webserver
Reporting Methodology
Installation of the Tools
Vulnerability Assessments
ADVANCED ETHICAL HACKING

System Hacking
OS Bypassing
Error Generation Method (Cracking Password)
Ngrok configuration
Windows Reverse Shell
Windows Machine Hacking
Getting the live screen with VNC

Mobile Hacking
Introduction to Mobile OS
Creating reverse shell with msfvenom
Binding the reverse shell
Tunnel forwarding with an open-source tool
Getting Access in the WAN connection
Getting Access to LAN connection
Exploiting the Mobile Platforms

Social Engineering
Introduction to Social Engineering
Types of Social Engineering
Human-based Social Engineering
Computer-based Social Engineering
Phishing (Zphisher)
1. Facebook Hacking
2. Instagram Hacking
Location Tracking
Camera Hacking
ADVANCED ETHICAL HACKING

Sniffing
Introduction to Sniffing
Introduction to Wireshark tool
Analyzing the data packets from Wireshark
Introduction to Bettercap
ARP spoofing
Performing DNS Spoofing attack
Man-in-the-Middle Attack – ARP Poisoning

DOS/DDOS (Distributed Denial-of-Service Attack)


Introduction to Denial-of-Service attack
Introduction to Distributed Denial-of-Service attack
Introduction to Botnets
Syn Flooding (DOS) attack
Perform a DOS attack using Hping3
Perform a DDOS attack using HOIC
Perform a DDOS attack using LOIC

Wireless Hacking
Wireless Encryptions
WEP (Wired Equivalent Privacy)
WPA (Wi-Fi Protected Access)
WPA2 (Wi-Fi Protected Access)
Hacking Wi-Fi Networks
Wi-Fi Deauther Attack
Brute forcing the WI-Fi Networks
Introduction to Service Defined Radio
ADVANCED ETHICAL HACKING

Password Cracking
Hack FTP Passwords
Hack Linux Password
Crack SSH Password
Crack Telnet Password

Cryptography
Types of Cryptography
Symmetric Key
Asymmetric key
Encryption Algorithms
Decoding and Encoding
Hide plain text in files (Steganography)
Configuring Steghide tool
Hiding Text in an Image
CCST Academy

Contact us

+91 81251 58604

www.chaitanyacyberstrix.com

[email protected]

You might also like