CORE ETHICAL HACKING COURSE SYLLABUS – 20 HOURS
SESSION 1 [1.5 hours]
- Disclaimer
- Hacking overview
- Types of hacking
- Types of hackers
- Cyber Laws
- Interesting terminologies
- Various cyber security domains; its career opportunities
- Live DEMO on Google Hacking
SESSION 2 [1.5 hours]
- How internet works?
- How file transfer happens? – OSI Layer overview
- How; Why do you hack?
- Types of IP Address (Private IP/Public IP/Static IP/Dynamic IP)
- Hands-on windows utilities – Pinging/Trace route
- Live DEMO on basic Windows commands
SESSION 3 [1.5 hours]
- Important Protocols
- Firewall; Anti virus
- Man in the Middle Attacks
- Live DEMO on Sniffing the packet using Wire shark
SESSION 4 [1.5 hours]
- Advance IP scanner
- Host discovery Tools
- Port Scanning
- Live DEMO on Nmap; its features
SESSION 5 [1.5 hours]
- Linux Basic commands
- Installing Kali Linux
- Kali Linux Tools overview
- Live DEMO on Kali Linux Tools
SESSION 6 [1.5 hours]
- Foot printing
- Information gathering
- Vulnerability scanning
- Active Fingerprinting
- Passive Fingerprinting
- Live DEMO on Metasploit attacks
SESSION 7 [1.5 hours]
- System hacking methodologies
- Registries and Rootkits
- Stenography; analysis
- Live DEMO and Working on Cain; Abel
SESSION 8 [1.5 hours]
- Trojans; analysis.
- Difference between Virus/Malware/Worms
- ARP/DNS poisoning
- Live DEMO on Key loggers
SESSION 9 [1.5 hours]
- Details on Exploit DB/CVE/NVD
- Windows/Linux Enumeration
- DNS/NTP Enumeration
- SNMP/SMB Enumeration
- Live DEMO on Enumeration
SESSION 10 [1.5 hours]
- Phishing Attacks; consequences
- Social Engineering Attacks
- Live DEMO on Password cracking (Dictionary/Brute force)
SESSION 11 [1.5 hours]
- Hacking into Wireless devices
- Vulnerability scanners
- Live DEMO on Nessus
SESSION 12 [1.5 hours]
- Pentesting and its types.
- How Web Works?
- Proxy; its importance
- OWASP TOP 10 vulnerabilities overview
- Hands on SQL Injection
- Live DEMO on SQLmap
SESSION 13 [2 hours]
- Live Demo on Web based attacks using Burp Suite
- Cross site scripting
- Live Demo on Beef to hack into social networks.
- What more to learn?
- Conclusion