The purpose of this course is to introduce students to the intriguing and interesting world of ethical hacking. With the ever-growing scope of Information Systems and the intricacies in the way different types of systems are interconnected, the world is waking up to challenges to keep information secure. Because of the tremendous implications this has on an organisation’s credibility and performance, companies are being pushed to implement a dedicated team of information security personnel, who are experts in studying the vulnerabilities present within and outside the system that may attract hackers. In order for them to do this with utmost perfection, it becomes important for them to learn how hackers work and be able to hack into the system, but ethically.
Module 1: Introduction to Ethical Hacking
Hacking Methodology, Process of Malicious Hacking, Footprinting and Scanning: Footprinting, Scanning. Enumeration: Enumeration. System Hacking and Trojans: System Hacking, Trojans and Black Box Vs White Box Techniques.
Module 2: Hacking Methodology
Denial of Service, Sniffers, Session Hijacking and Hacking Web Servers: Session Hijacking, Hacking Web Servers. Web Application Vulnerabilities and Web Techniques Based Password Cracking: Web Application Vulnerabilities, Web Based Password Cracking Techniques.
Module 3: Web And Network Hacking
SQL Injection, Hacking Wireless Networking, Viruses, Worms and Physical Security: Viruses and Worms, Physical Security. Linux Hacking: Linux Hacking. Evading IDS and Firewalls: Evading IDS and Firewalls.
Module 4: Report Writing and Mitigation
Introduction to Report Writing & Mitigation, requirements for low level reporting & high level reporting of Penetration testing results, Demonstration of vulnerabilities and Mitigation of issues identified including tracking.
Define ethical hacking
Apply the most appropriate type of penetration testing to a system, in order to gather information
List four methods that can be used for Windows enumeration
Interpret the result of running NBTSTAT (NetBIOS over TCP/IP)on a machine in a local network
Describe the role of sniffers in hacking
Explain how DoS attacks work with examples
Identify sniffing tools and their features
Who Should Attend?
Engineering and IT students
Graduates with a programming background
Information Security Analyst
Technical Support Engineer
After completing this course and successfully passing the certification examination, the student will be awarded the “Ethical Hacking” certification.
If a learner chooses not to take up the examination, they will still get a 'Participation Certificate'
Frequently Asked Questions
Course Features :
Mode Of Delivery:
Valid for 6 months post activation