Ethical Hacking Training

$400.00

Category:

Description

Introduction to Ethical Hacking

Information Security Overview

Cyber Kill Chain Concepts

Hacking Concepts

Ethical Hacking Concepts

Information Security Controls

Information Security Laws and Standards

Reconnaissance Techniques

Footprinting and Reconnaissance

Footprinting Concepts

Footprinting Methodology

Footprinting through Search Engines

Footprinting through Web Services

Footprinting through Social Networking Sites

Website Footprinting

Email Footprinting

WhoisFootprinting

DNS Footprinting

Network Footprinting

Footprinting through Social Engineering

Footprinting Tools

Footprinting Countermeasures

Scanning Networks

Network Scanning Concepts

Scanning Tools

Host Discovery

Port and Service Discovery

OS Discovery (Banner Grabbing/OS Fingerprinting)

Scanning Beyond IDS and Firewall

Draw Network Diagrams

Enumeration

Enumeration Concepts

NetBIOS Enumeration

SNMP Enumeration

LDAP Enumeration

NTP and NFS Enumeration

SMTP and DNS Enumeration

Other Enumeration Techniques (IPsec, VoIP, RPC, Unix/Linux, Telnet, FTP, TFTP, SMB, IPv6, and BGP

enumeration)

Enumeration Countermeasures

System Hacking Phases and Attack Techniques

Vulnerability Analysis

Vulnerability Assessment Concepts

Vulnerability Classification and Assessment Types

Vulnerability Assessment Solutions and Tools

Vulnerability Assessment Reports

System Hacking

System Hacking Concepts

Gaining Access

Cracking Passwords

Vulnerability Exploitation

Escalating Privileges

Maintaining Access

Executing Applications

Hiding Files

Clearing Logs

Malware Threats

Malware Concepts

APT Concepts

Trojan Concepts

Virus and Worm Concepts

Fileless Malware Concepts

Malware Analysis

Malware Countermeasures

AntiMalware Software

Network and Perimeter Hacking

Sniffing

Sniffing Concepts

Sniffing Technique: MAC Attacks

Sniffing Technique: DHCP Attacks

Sniffing Technique: ARP Poisoning

Sniffing Technique: Spoofing Attacks

Sniffing Technique: DNS Poisoning

Sniffing Tools

Sniffing Countermeasures

Sniffing Detection Techniques

Social Engineering

Social Engineering Concepts

Social Engineering Techniques

Insider Threats

Impersonation on Social

Networking Sites

Identity Theft

Social Engineering Countermeasures

DenialofService

DoS/DDoS Concepts

DoS/DDoS Attack Techniques

Botnets

DDoS

Case Study

DoS/DDoS Attack Tools

DoS/DDoS Countermeasures

DoS/DDoS Protection Tools

Session Hijacking

Session Hijacking Concepts

Application Level Session Hijacking

Network Level Session Hijacking

Session Hijacking Tools

Session Hijacking Countermeasures

Evading IDS, Firewalls, and Honeypots

IDS, IPS, Firewall, and Honeypot Concepts

IDS, IPS, Firewall, and Honeypot Solutions

Evading IDS

Evading Firewalls

IDS/Firewall Evading Tools

Detecting Honeypots

IDS/Firewall Evasion Countermeasures

Web Application Hacking

Hacking Web Servers

Web Server Concepts

Web Server Attacks

Web Server Attack Methodology

Web Server Attack Tools

Web Server Countermeasures

Patch Management

Web Server Security Tools

Hacking Web Applications

Web App Concepts

Web App Threats

Web App Hacking Methodology

Footprint Web Infrastructure

Analyze Web Applications

Bypass ClientSide Controls

Attack Authentication Mechanism

Attack Authorization Schemes

Attack Access Controls

Attack Session Management Mechanism

Perform Injection Attacks

Attack Application Logic Flaws

Attack Shared Environments

Attack Database Connectivity

Attack Web App Client

Attack Web Services

Web API, Webhooks and Web Shell

Web App Security

SQL Injection

SQL Injection Concepts

Types of SQL Injection

SQL Injection Methodology

SQL Injection Tools

Evasion Techniques

SQL Injection Countermeasures

Wireless Network Hacking

Hacking Wireless Networks

Wireless Concepts

Wireless Encryption

Wireless Threats

Wireless Hacking Methodology

Wireless Hacking Tools

Bluetooth Hacking

Wireless Countermeasures

Wireless Security Tools

Duration & Timings :

Duration – 40 Hours.

Training Type: Online Live Interactive Session.

Faculty: Experienced.

Weekend Session – Sat & Sun  9:30 AM – 12:30 PM (EST) – 7 Weeks. January 4, 2025.

Weekday  Session –  Mon – Thu 8:30 PM – 10:30 PM (EST)– 5 Weeks. February 3, 2025.

 Inquiry Now         Discount Offer 

USA: +1 734 418 2465 | India: +91 40 4018 1306

Reviews

There are no reviews yet.

Be the first to review “Ethical Hacking Training”

LEARNTEK

© 2019 LEARNTEK. ALL RIGHTS RESERVED | Privacy Policy | Terms & Conditions



USA: +1 734 418 2465 | info@learntek.org Discount Offer
Season's Best Discount Offer End's in
Discount Offer