Call us Today! +91 9873002527, 8744803854 | ravi@thedigiexperts.com

Setup Menus in Admin Panel

Ethical Hacking

1st Day

Unit 1 : Introduction of Ethical Hacking

01. What is Security?
02. Ethical Hacking Concepts
03. Types of Hacker
04. Phases of hacking
05. History of Hacking

Unit 2 : Footprinting and Reconnaissance

01. Introduction of Footprinting
02. Benefits of Footprinting
03. Techniques of Reconnaissance (Information Gathering)

Unit 3 : Google Hacking

01. Working Process of Google Searching
02. Crawling & Indexing of Google
03. Uses of Advanced Google Operators
04. Explanation of Robots.txt
05. Countermeasures and Prevention

Unit 4 : Scanning Networks & System Hacking

01. Introduction of Scanning
02. Types of Scanning
03. Objectives of Scanning
04. Concept of System Hacking
05. Password Cracking techniques
06. Uses of tools to crack the Windows Password
07. Password Cracking Countermeasure
08. Keylogger

Unit 5 : Malwares

01. Introduction of Malwares
02. Differences b/t Virus,Worms, Trojans and Ransomeware
03. Working of Malwares
04. Prevention of Malwares

Unit 6 : Sniffing & Social Engineering

01. Introduction of Sniffing
02. Types of Sniffing Attacks
03. Importance of Social Engineering
04. Techniques of Social Engineering
05. Techniques of Sniffing Attacks
06. Countermeasures of Sniffing and Social Engineering

Unit 7 : Wireless Hacking

01. Introduction of Wireless Technology
02. Wi-Fi Standard
03. Scanning and Detection of Wi-Fi Network
04. Wi-Fi Security Standards
05. Wi-Fi Hacking Techniques
06. Securing of Wi-Fi

Unit 8 : Cryptography

01. Concept of Cryptography
02. Uses of Cryptography
03. Symmetric & Asymmetric Key
04. Hash Functions, Digital Signatures and Certificate Authority
05. Cryptography Attacks for Cracking Encryption
06. Disk Encryption

Unit 9 : SQL Injections Attacks

01. Introduction of SQL
02. Concept of Blind SQL Injection
03. Techniques of Advance SQL Injection Attacks
04. Prevention of SQL Attacks

2nd Day

Unit 1 : Introduction of Ethical Hacking

01. What is Security?
02. Ethical Hacking Concepts
03. Types of Hacker
04. Phases of hacking
05. History of Hacking

Unit 2 : Footprinting and Reconnaissance

01. Introduction of Footprinting
02. Benefits of Footprinting
03. Techniques of Reconnaissance (Information Gathering)

Unit 3 : Google Hacking

01. Working Process of Google Searching
02. Crawling & Indexing of Google
03. Uses of Advanced Google Operators
04. Explanation of Robots.txt
05. Countermeasures and Prevention

Unit 4 : Scanning Networks

01. Introduction of Scanning
02. Types of Scanning
03. Objectives of Scanning

Unit 5 : System Hacking

01. Concept of System Hacking
02. Password Cracking techniques
03. Uses of tools to crack the Windows Password
04. Password Cracking Countermeasure
05. Keylogger
06. More techniques to System Hacking

Unit 6 : Viruses and Worms

01. Introduction of Virus and Worms
02. Differences b/t Virus and Worms
03. History of Virus and Worms
04. Prevention of Virus and Worms

Unit 7 : Trojans and Backdoors

01. Intro and Objectives of Trojan
02. Working of Trojans and Backdoors
03. Common Symptoms of Trojan Infection
04. Uses of Binders and Wrappers
05. Prevention & Avoiding Trojan Infection

Unit 8 : Email Hacking and Security

01. Email – Introduction
02. E-Mail Tracing
03. Phishing, Fake E-Mails and Spam
04. Securing E-Mails

Unit 9 : Sniffing

01. Introduction of Sniffing
02. Types of Sniffing Attacks
03. ARP Poisoning, DNS Spoofing and MAC Spoofing
04. Techniques of Sniffing Attacks
05. Countermeasures of Sniffing

Unit 10 : Social Engineering

01. Importance of Social Engineering
02. Techniques of Social Engineering
03. Social Networking Sites
04. Countermeasures of Social Engineering

Unit 11 : Wireless Hacking

01. Introduction of Wireless Technology
02. Wi-Fi Standard
03. Scanning and Detection of Wi-Fi Network
04. Wi-Fi Security Standards
05. Wi-Fi Hacking Techniques
06. Securing of Wi-Fi

Unit 12 : Cryptography

01. Concept of Cryptography
02. Uses of Cryptography
03. Symmetric & Asymmetric Key
04. Hash Functions, Digital Signatures and Certificate Authority
05. Cryptography Attacks for Cracking Encryption
06. Disk Encryption

Unit 13 : Advanced SQL Injections

01. Introduction of SQL
02. Concept of Blind SQL Injection
03. Techniques of Advance SQL Injection Attacks
04. Prevention of SQL Attacks

Unit 14 : Hacking Web Server

01. Intro and Working process of Web Server
02. Loopholes and Vulnerabilities of Web Server
03. Web Server Injection Flaws
04. RFI & LFI
05. Countermeasures of Web Server

Unit 15 : Firewall, IDS and Honeypots

01. Interlocution of Firewall
02. Types of Firewall
03. Bypassing of Firewall and Countermeasures
04. Concept of HoneyPot
05. Types and Detection of HoneyPot
06. Intro of IDS (Intrusion Detection System)
07. Types of IDS
08. Functions and Uses of IDS

Unit 16 : Reverse Engineering Techniques

01. Concept of Reverse Engineering
02. Explanation of Dissembler and Decompilers
03. Uses of Reverse Engineering Techniques

Unit 17 : Mobile Hacking

01. Explanation of Mobile Platform Attacks
02. Various Mobile Related Threats and Attacks
03. Concept of Mobile Security tools
04. Countermeasures of Mobile Hacking

© 2018 All Rights Reserved
X