Ethical Hacking(Cyber Security)

Ethical Hacking(Cyber Security)

  • Course Overview
  • What you will learn
  • Outcomes

Course Overview


  • Course Overview
  • What you will learn
  • Outcomes

Course Overview

Do you want to ramp up your career in Cyber Security Industry??

Do you want to secure your websites or mobile apps??

If you have answered YES to above questions, then you are at the right place.

Learn Ethical Hacking,  with Complete Hands-on Training. Ethical Hacking has a growing demand as 4iR is tomorrows future. In this amazing course, we are excited to share with you, the techniques and the concepts for the ethical hacking and the penetration testing. We are providing every essential you need to know as an ethical hacker, insights this course. This course is a complete guide for you. This course starts with the introduction, followed by the required software installations. You will learn about network and web scanning, deep scanning, deep scanning phases,  hacking systems, different attacks and malwares. You will also learn about Hijacking, Hacking Servers, Hacking Websites and SQL Injection. Later in the course we will also discuss about how to use Kali Linux for ethical hacking. You will have different practicals on using Kali Linux such as for information gathering, vulnerability analysis, web application analysis, database assessment and password attacks, which will make you understand better and have some hands-on experience.

Requirements

  • Basic Knowledge of Computer
  • Basic Knowledge of Networking
  • Basic Knowledge of Database, Serverside Programming (PHP or JSP or ASP.net)

What you will learn

  • Kali Linux operating system 
  • What is Hacking
  • What is Ethical Hacking
  • Types of Hackers
  • White Hat Hacker
  • Black Hat Hackers
  • Gray Hat Hackers
  • Script Kiddies
  • Hacktivists
  • Spy Hackers
  • Cyber Terrorists
  • Vulnerability
  • Exploit
  • Remote Exploit
  • Local Exploit
  • Zero-day
  • 0-day vulnerability
  • Zero-day Exploit
  • Brute force attack
  • Phishing
  • Remote access
  • Payload

Chapter 2 – Steps of Ethical Hacking Information Gathering

  • Active Information Gathering
  • Passive Information Gathering
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

Chapter 3 – Types of Malicious files

  • Viruses
  • Worms
  • Trojan Horse
  • Spyware
  • Adware
  • Backdoor
  • Rootkits
  • Ransomware

Chapter 4 –  Penetration Testing

  • What is Penetration Testing
  • Types of Penetration Testing
  • What is white box Penetration Testing
  • What is Black Box Penetration testing
  • Introduction to Linux OS
  • Social Engineering

Chapter 5 – Google Hacking Using Dorks Demo

Lab Setup

  • What is Virtual Machine
  • What’s VMware
  • What is Virtual Box
  • Installing VMware
  • Install Kali Linux
  • Installing Windows XP
  • Install Windows 7
  • Install Add on in Mozila
  • Tamper Data
  • Burp Suite
  • No-Redirect
  • Install Nessus

Chapter 6 – System Hacking

  • System Hacking using Kon-Boot
  • Network Scanning
  • Port Scanning
  • Service Scanning
  • What is Nmap
  • Scanning With Nmap
  • Nmap Various Command

Chapter 7 – Scanning With Nessus Hacking With Metasploit

  • What is Metasploit?
  • Xp Remote Exploit using Metasploit
  • Msfvenom
  • Windows7 UAC Bypass

Chapter 8 – What is SE-Toolkit

  • SE-Toolkit Usages
  • Create Phishing page with SE-Toolkit
  • Hacking Facebook & Gmail password

Chapter 9 – What is Remote Administration Tool

  • What is RAT
  • Exploit With RAT
  • Protect System from RAT

Chapter 10 – What is Sniffing

  • Types of Sniffing
  • Network Sniffing with Wireshark
  • Get FTP Login Details Using Wireshark

Chapter 11 – What is DOS

  • Details of DOS
  • What is DDOS

Chapter 12 – Wireless Network Hacking

  • Wireless Encryption
  • Hacking WPA 2

Chapter 13 – Web Application Pen-testing

  • How Web Application Works
  • Request and Response
  • Installing Scanner (Acunetix,Netsparker)
  • Scanning Website

Chapter 14 – OWASP Top 10

  • What is Sql-Injection?
  • Types of Sql-Injection
  • Live Demo on Sql-Injection

Chapter 15 – What is XSS

  • Types of XSS
  • Live Demo on XSS All types

Chapter 16 – What is CSRF

  • Live Demo On CSRF What is HTML Injection
  • Live Demo on HTML Injection

Chapter 17 – What is Directory Listing

  • Live Demo on Directory Listing What is Broken Auth
  • Demonstration on Broken Auth What is Tamper data?
  • Live Demo on Tamper Data on Ecommerce site
  • Session Hijacking

Chapter 18 – What is Phishing?

  • Create a Phishing Page What is Web Shell
  • Hack Web-Server Using Web-Shell

Chapter 19 – Hacking Android Phone using Metasploit Question and Answer Class

Outcomes

Cyber Security Professional
Network Security Professional
Web Penetration Tester
Security Consultant
Application Penetration Tester

What you will learn


  • Course Overview
  • What you will learn
  • Outcomes

Course Overview

Do you want to ramp up your career in Cyber Security Industry??

Do you want to secure your websites or mobile apps??

If you have answered YES to above questions, then you are at the right place.

Learn Ethical Hacking,  with Complete Hands-on Training. Ethical Hacking has a growing demand as 4iR is tomorrows future. In this amazing course, we are excited to share with you, the techniques and the concepts for the ethical hacking and the penetration testing. We are providing every essential you need to know as an ethical hacker, insights this course. This course is a complete guide for you. This course starts with the introduction, followed by the required software installations. You will learn about network and web scanning, deep scanning, deep scanning phases,  hacking systems, different attacks and malwares. You will also learn about Hijacking, Hacking Servers, Hacking Websites and SQL Injection. Later in the course we will also discuss about how to use Kali Linux for ethical hacking. You will have different practicals on using Kali Linux such as for information gathering, vulnerability analysis, web application analysis, database assessment and password attacks, which will make you understand better and have some hands-on experience.

Requirements

  • Basic Knowledge of Computer
  • Basic Knowledge of Networking
  • Basic Knowledge of Database, Serverside Programming (PHP or JSP or ASP.net)

What you will learn

  • Kali Linux operating system 
  • What is Hacking
  • What is Ethical Hacking
  • Types of Hackers
  • White Hat Hacker
  • Black Hat Hackers
  • Gray Hat Hackers
  • Script Kiddies
  • Hacktivists
  • Spy Hackers
  • Cyber Terrorists
  • Vulnerability
  • Exploit
  • Remote Exploit
  • Local Exploit
  • Zero-day
  • 0-day vulnerability
  • Zero-day Exploit
  • Brute force attack
  • Phishing
  • Remote access
  • Payload

Chapter 2 – Steps of Ethical Hacking Information Gathering

  • Active Information Gathering
  • Passive Information Gathering
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

Chapter 3 – Types of Malicious files

  • Viruses
  • Worms
  • Trojan Horse
  • Spyware
  • Adware
  • Backdoor
  • Rootkits
  • Ransomware

Chapter 4 –  Penetration Testing

  • What is Penetration Testing
  • Types of Penetration Testing
  • What is white box Penetration Testing
  • What is Black Box Penetration testing
  • Introduction to Linux OS
  • Social Engineering

Chapter 5 – Google Hacking Using Dorks Demo

Lab Setup

  • What is Virtual Machine
  • What’s VMware
  • What is Virtual Box
  • Installing VMware
  • Install Kali Linux
  • Installing Windows XP
  • Install Windows 7
  • Install Add on in Mozila
  • Tamper Data
  • Burp Suite
  • No-Redirect
  • Install Nessus

Chapter 6 – System Hacking

  • System Hacking using Kon-Boot
  • Network Scanning
  • Port Scanning
  • Service Scanning
  • What is Nmap
  • Scanning With Nmap
  • Nmap Various Command

Chapter 7 – Scanning With Nessus Hacking With Metasploit

  • What is Metasploit?
  • Xp Remote Exploit using Metasploit
  • Msfvenom
  • Windows7 UAC Bypass

Chapter 8 – What is SE-Toolkit

  • SE-Toolkit Usages
  • Create Phishing page with SE-Toolkit
  • Hacking Facebook & Gmail password

Chapter 9 – What is Remote Administration Tool

  • What is RAT
  • Exploit With RAT
  • Protect System from RAT

Chapter 10 – What is Sniffing

  • Types of Sniffing
  • Network Sniffing with Wireshark
  • Get FTP Login Details Using Wireshark

Chapter 11 – What is DOS

  • Details of DOS
  • What is DDOS

Chapter 12 – Wireless Network Hacking

  • Wireless Encryption
  • Hacking WPA 2

Chapter 13 – Web Application Pen-testing

  • How Web Application Works
  • Request and Response
  • Installing Scanner (Acunetix,Netsparker)
  • Scanning Website

Chapter 14 – OWASP Top 10

  • What is Sql-Injection?
  • Types of Sql-Injection
  • Live Demo on Sql-Injection

Chapter 15 – What is XSS

  • Types of XSS
  • Live Demo on XSS All types

Chapter 16 – What is CSRF

  • Live Demo On CSRF What is HTML Injection
  • Live Demo on HTML Injection

Chapter 17 – What is Directory Listing

  • Live Demo on Directory Listing What is Broken Auth
  • Demonstration on Broken Auth What is Tamper data?
  • Live Demo on Tamper Data on Ecommerce site
  • Session Hijacking

Chapter 18 – What is Phishing?

  • Create a Phishing Page What is Web Shell
  • Hack Web-Server Using Web-Shell

Chapter 19 – Hacking Android Phone using Metasploit Question and Answer Class

Outcomes

Cyber Security Professional
Network Security Professional
Web Penetration Tester
Security Consultant
Application Penetration Tester

Outcomes


  • Course Overview
  • What you will learn
  • Outcomes

Course Overview

Do you want to ramp up your career in Cyber Security Industry??

Do you want to secure your websites or mobile apps??

If you have answered YES to above questions, then you are at the right place.

Learn Ethical Hacking,  with Complete Hands-on Training. Ethical Hacking has a growing demand as 4iR is tomorrows future. In this amazing course, we are excited to share with you, the techniques and the concepts for the ethical hacking and the penetration testing. We are providing every essential you need to know as an ethical hacker, insights this course. This course is a complete guide for you. This course starts with the introduction, followed by the required software installations. You will learn about network and web scanning, deep scanning, deep scanning phases,  hacking systems, different attacks and malwares. You will also learn about Hijacking, Hacking Servers, Hacking Websites and SQL Injection. Later in the course we will also discuss about how to use Kali Linux for ethical hacking. You will have different practicals on using Kali Linux such as for information gathering, vulnerability analysis, web application analysis, database assessment and password attacks, which will make you understand better and have some hands-on experience.

Requirements

  • Basic Knowledge of Computer
  • Basic Knowledge of Networking
  • Basic Knowledge of Database, Serverside Programming (PHP or JSP or ASP.net)

What you will learn

  • Kali Linux operating system 
  • What is Hacking
  • What is Ethical Hacking
  • Types of Hackers
  • White Hat Hacker
  • Black Hat Hackers
  • Gray Hat Hackers
  • Script Kiddies
  • Hacktivists
  • Spy Hackers
  • Cyber Terrorists
  • Vulnerability
  • Exploit
  • Remote Exploit
  • Local Exploit
  • Zero-day
  • 0-day vulnerability
  • Zero-day Exploit
  • Brute force attack
  • Phishing
  • Remote access
  • Payload

Chapter 2 – Steps of Ethical Hacking Information Gathering

  • Active Information Gathering
  • Passive Information Gathering
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

Chapter 3 – Types of Malicious files

  • Viruses
  • Worms
  • Trojan Horse
  • Spyware
  • Adware
  • Backdoor
  • Rootkits
  • Ransomware

Chapter 4 –  Penetration Testing

  • What is Penetration Testing
  • Types of Penetration Testing
  • What is white box Penetration Testing
  • What is Black Box Penetration testing
  • Introduction to Linux OS
  • Social Engineering

Chapter 5 – Google Hacking Using Dorks Demo

Lab Setup

  • What is Virtual Machine
  • What’s VMware
  • What is Virtual Box
  • Installing VMware
  • Install Kali Linux
  • Installing Windows XP
  • Install Windows 7
  • Install Add on in Mozila
  • Tamper Data
  • Burp Suite
  • No-Redirect
  • Install Nessus

Chapter 6 – System Hacking

  • System Hacking using Kon-Boot
  • Network Scanning
  • Port Scanning
  • Service Scanning
  • What is Nmap
  • Scanning With Nmap
  • Nmap Various Command

Chapter 7 – Scanning With Nessus Hacking With Metasploit

  • What is Metasploit?
  • Xp Remote Exploit using Metasploit
  • Msfvenom
  • Windows7 UAC Bypass

Chapter 8 – What is SE-Toolkit

  • SE-Toolkit Usages
  • Create Phishing page with SE-Toolkit
  • Hacking Facebook & Gmail password

Chapter 9 – What is Remote Administration Tool

  • What is RAT
  • Exploit With RAT
  • Protect System from RAT

Chapter 10 – What is Sniffing

  • Types of Sniffing
  • Network Sniffing with Wireshark
  • Get FTP Login Details Using Wireshark

Chapter 11 – What is DOS

  • Details of DOS
  • What is DDOS

Chapter 12 – Wireless Network Hacking

  • Wireless Encryption
  • Hacking WPA 2

Chapter 13 – Web Application Pen-testing

  • How Web Application Works
  • Request and Response
  • Installing Scanner (Acunetix,Netsparker)
  • Scanning Website

Chapter 14 – OWASP Top 10

  • What is Sql-Injection?
  • Types of Sql-Injection
  • Live Demo on Sql-Injection

Chapter 15 – What is XSS

  • Types of XSS
  • Live Demo on XSS All types

Chapter 16 – What is CSRF

  • Live Demo On CSRF What is HTML Injection
  • Live Demo on HTML Injection

Chapter 17 – What is Directory Listing

  • Live Demo on Directory Listing What is Broken Auth
  • Demonstration on Broken Auth What is Tamper data?
  • Live Demo on Tamper Data on Ecommerce site
  • Session Hijacking

Chapter 18 – What is Phishing?

  • Create a Phishing Page What is Web Shell
  • Hack Web-Server Using Web-Shell

Chapter 19 – Hacking Android Phone using Metasploit Question and Answer Class

Outcomes

Cyber Security Professional
Network Security Professional
Web Penetration Tester
Security Consultant
Application Penetration Tester