8939260766
info@edunavo.com
REGISTER
LOGIN
Category
5G
Advance
Automation
B.Tech Course
Basic+Intermediate
Certification
Financial
NTN
Premium
Testing
Trainer
MENU
Home
Courses
B.Tech Course
Digital Store
Doubt Session
Pricing
Trainers
Contact
Mock Test
Home
Courses
Premium
ETHICAL HACKING
ETHICAL HACKING
Curriculum
20 Sections
21 Lessons
45 Hours
Expand all sections
Collapse all sections
Module1: Introduction to Ethical Hacking
2
1.1
Overview of ethical hacking, its goals, legal implications, and the different types of hackers (white hat, black hat, gray hat).
1.2
Understanding the hacking process and methodology.
Module2: Foot printing and Reconnaissance
1
2.1
Techniques for gathering information about a target system or organization, such as DNS queries, WHOIS lookups, and social engineering, to build a profile for attacks.
Module3: Scanning Networks
1
3.1
Methods to discover active devices, open ports, and services on a network using tools like Nmap and Netcat. Identifying live hosts and potential vulnerabilities.
Module 4: Enumeration
1
4.1
Extracting detailed information such as usernames, machine names, and shares from systems to identify potential points of attack.
Module 5: Vulnerability Analysis
1
5.1
Identifying weaknesses in systems and networks using automated tools and manual techniques to assess potential security gaps.
Module 6. System Hacking
1
6.1
Steps hackers use to gain unauthorized access, escalate privileges, maintain access, and cover tracks on compromised systems.
Module 7: Malware Threats
1
7.1
Understanding different types of malware (viruses, worms, Trojans, ransomware), their propagation methods, and how to detect and prevent them.
Module 8: Sniffing
1
8.1
Capturing and analyzing network traffic to intercept sensitive information using tools like Wireshark and tcpdump.
Module 9: Social Engineering
1
9.1
Psychological manipulation techniques used to trick users into revealing confidential information or granting access.
Module 10: Denial-of-Service (DoS)
1
10.1
Attacks designed to overwhelm and disrupt services, including flood attacks and methods to detect and mitigate DoS attacks.
Module 11: Session Hijacking
1
11.1
Techniques to take over active sessions between a user and a service, including stealing session tokens and cookies.
Module 12: Evading IDS, Firewalls, and Honeypots
1
12.1
Methods attackers use to bypass security measures such as Intrusion Detection Systems and firewalls to avoid detection.
Module 13: Hacking Web Servers
1
13.1
Exploiting vulnerabilities in web servers to gain unauthorized access or cause disruption.
Module 14: Hacking Web Applications
1
14.1
Attacking web applications through flaws like cross-site scripting (XSS), SQL injection, and others.
Module 15: SQL Injection
1
15.1
A specific attack targeting databases by injecting malicious SQL code to manipulate or retrieve data.
Module 16: Hacking Wireless Networks
1
16.1
Techniques to attack Wi-Fi networks, crack encryption, and exploit weaknesses in wireless Protocols.
Module 17: Hacking Mobile Platforms
1
17.1
Security issues and attack methods related to smartphones and tablets, including app vulnerabilities and OS exploits.
Module 18: IoT Hacking
1
18.1
Understanding vulnerabilities in Internet of Things devices and how to exploit or protect them.
Module 19: Cloud Computing
1
19.1
Security challenges unique to cloud environments and techniques to protect cloud resources.
Module 20: Cryptography
1
20.1
Basics of encryption, hashing, digital signatures, and how cryptography is used to secure data
This content is protected, please
login
and
enroll
in the course to view this content!
WhatsApp us
Modal title
Main Content