Ethical Hacking

What is Ethical Hacking ?

An Ethical Hacker is a technology expert; typically employed by an organization to assess the security system of the organization in order to discover vulnerabilities that can be exploited. Ethical hackers may use the same methods as the black hat hackers, but report the problems instead of taking advantage of them. This course on Ethical Hacking for Beginners goes deep down into the depths of networking, systems, web applications and actual exploitation and helps beginners to take their confident

Why should you attend this course?

One of the greatest highlights of this course is that it is built by experts who do penetration testing on a regular basis. Since it is built by practitioners in the field, it is regularly updated with the latest tools, techniques, and real-world scenarios. The lab setup for the course will give beginners a very good practical hands on experience of ethical hacking rather than just plain theory explanation. The participants will get to break into vulnerable applications and systems that have been set up to create levels of challenges and sharpen their skills.

Information Security - What & Why?

  • Introduction to Information security
  • Overview IT Act
  • E-Crimes & Penalties
  • Understanding PenTest methodologies (black/white/gray - box)
  • Introduction to Computer Networks
  • Major Topologies in Networks
  • Network Design & Components
  • IP addressing
  • Network protocols

Network Basics

  • Concept of routing and switching
  • OSI reference model
  • TCP/IP model
  • Diving into OSI layers in details
  • TCP v/s UDP services
  • Common TCP and UDP services
  • Understanding ICMP messages

Protocol Analysis

  • Understanding things in the packet layer
  • Wireshark-The packet analyzer
  • Analyzing the host-to-host packet transmission
  • synchronizations of hosts
  • termination of hosts
  • finishing of host

Operating System Basics

  • Introduction to Windows Server - 2008
  • Active Directory Fundamentals
  • Operational Units
  • Concept of ACL
  • Linux system architecture
  • File system implementation
  • Backtrack files and folders walkthrough
  • Diving into the Pentest folder - Backtrack
  • Understanding Linux shell
  • Working with Linux shell commands

Breaking into Networks

  • Portscan - Beginner to Expert level
  • Mastering Nmap
  • Working with LUA
  • Cooking custom Nmap scripts
  • Concept of fingerprinting and footprinting
  • Google Hacking
  • Enumeration of services
  • Banner Grabbing

Exploiting the target

  • Finding vulnerability - Automated methods
  • Using Vulnerability Scanners (Nessus & GFI)
  • Interpreting the automated scanner report
  • Getting into the system
  • Working with exploit code - Exploitation Framework (msf)
  • Attacking LAN
  • Firewall Evasion
  • Firewall introduction & types
  • Detection methodologies
  • Fire-walking
  • Evasion Methodologies
  • Packet crafting
  • Understanding Overflow
  • Buffer Overflow (Stack & Heap)
  • Exploiting Windows & Linux
  • Protection Mechanisms
What's 15 + 11 =

class for demo


Jamia Nagar Batch
Maharani Bagh Batch



query button