Select Your Style

Choose your layout

Color scheme

Comprehensive Ethical Hacking Course – Beginner to Advanced

Comprehensive Ethical Hacking Course – Beginner to Advanced

INR₹4,237.00 + GST

Please login to purchase the course.

Slides in English

Explanation in Hindi + English

Clear
SKU: cid_176321 Category: Tags: ,
About the course

In this course, you will learn ethical hacking from the ground up. You will first get a brief introduction to ethical hacking followed by detailed instructions to set up the environment. Then you will learn about password cracking, WiFi hacking, Dos attacks, SQL injections and a lot more.

Credit Score  = 19+1+4+(38+1+30) = 93 (Formula to calculate credit score is available here)
Learning Outcomes

After completing this course, you will be able to:

  • Get answers to every single question you have about ethical hacking and penetration testing from an experienced IT professional.
  • Secure and protect any network from hackers and loss of data.
  • Boost your hireability through innovative and independent learning.
  • Get a certificate on successful completion of the course.
Target Audience

The course can be taken by:

Students: All students who are pursuing any technical and professional courses related to computer science/information technology.

Teachers/Faculties: All computer science teachers/faculties who wish to acquire new skills.

Professionals: All IT professionals who wish to upgrade their skills.

Why learn Ethical Hacking?

Ethical Hacking sometimes called as Penetration Testing is an act of intruding/penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. Ethical hackers may use the same methods and tools used by the malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems from attacks by malicious users.

In today's digital era, one of the biggest threats comes from cybercriminals. Hackers were not taken seriously until a few years back. Recently, some big names in the Indian industry had to pay hefty sums of money to hackers to keep confidential information from being disclosed to the government. According to surveys conducted by the cybersecurity firms in the country, Indian firms lost more than $4 billion in 2013 alone because of hackers. With more and more companies entering the e-commerce ecosystem and adopting new technologies like cloud computing, the threat from imminent security breaches is clearly demanding the need for efficient information security systems. The rising threat from cyber-attacks has exposed the severe shortage of talent in this sector. As per 2015 figures reported by Nasscom, India needed more than 77,000 white hat hackers as against only a mere 15,000 certified professional ethical hackers in that year.

Course Features
  • 24X7 Access: You can view lectures as per your own convenience.
  • Online lectures: ~19 hours of online lectures with high-quality videos.
  • Updated Quality content: Content is latest and gets updated regularly to meet the current industry demands.
Test & Evaluation

There will be a final test containing a set of multiple choice questions. Your evaluation will include the scores achieved in the final test.

Note:
  1. The access to the course can be extended 3 months at a time (for upto 4 times) just by sending a mail requesting for an extension to the email id in the footer.
  2. The hard copy of the certificate shall be shipped to your registered address or your college
  3. There is no soft copy of the certificate.
  4. To get access to the certificate - you need to take the online exam at the end of the course

No prerequisites

Topics to be covered
  • Introduction
  • Basic terminology part 1
  • Basic terminology part 2
  • Installing VirtualBox with RPM
  • VirtualBox installation using the Linux package manager
  • Virtual machine configuration
  • VirtualBox installation on Windows
  • Kali Linux installation
  • Kali Linux boot up, wireless configuration, software updates
  • Installing VirtualBox guest additions
  • Linux terminal basics
  • Linux command line essentials part 1
  • Linux command line essentials part 2
  • Using the Tor browser to access the dark web part 1
  • Using the Tor browser to access the dark web part 2
  • Proxychains part 1
  • Proxychains part 2
  • Proxychains part 3
  • VPN setup part 1
  • VPN setup part 2
  • Macchanger part 1
  • Macchanger part 2
  • Nmap part 1
  • Nmap part 2
  • Resources for known vulnerabilities
  • Intro to WiFi cracking
  • Aircrack and Reaver installation
  • Aircrackng and Crunch setup
  • Aircrack and Crunch usage example part 1
  • Aircrack and Crunch usage example part 2
  • Aircrack and Crunch usage example part 3
  • Reaver part 1
  • Reaver part 2
  • Reaver part 3
  • Signal jamming and denial of service part 1
  • Signal jamming and denial of service part 2
  • SSL strip part 1
  • SSL strip part 2
  • SSL strip part 3
  • Funny things part 1
  • Funny things part 2
  • Funny things part 3
  • Evil twin part 1
  • Evil twin part 2
  • Evil twin part 3
  • Router vulnerabilities part 1
  • Router vulnerabilities part 2
  • Router vulnerabilities part 3
  • Intro to social engineering
  • Website cloning
  • Social engineering demo
  • Intro to SQL injections
  • MySQL database setup
  • Burp suite setup
  • SQLmap demo part 1
  • SQLmap demo part 2
  • Intro to cracking hashes
  • Cracking Linux passwords part 1
  • Cracking Linux passwords part 2
  • Cracking Windows passwords
  • Hydra part 1
  • Hydra part 2
  • DoS part 1
  • DoS part 2
  • DoS part 3
  • Metasploit and reverse shells
  • Deploying a payload with Metasploit
  • Escalating privileges on another system
  • Creating a persistent reverse shell with Metasploit
  • Creating reverse shells with Netcat
  • Uploading a reverse shell to a web server

As a part of this program, you are required to do project work. The project specifications have been drawn in consultation with the industry. The project work has to meet these specifications and can be done in group of upto 5 members.

Create a powerpoint presentation of at least 30 slides on any two of the following:(2 PPTs of 30 slides each, max time 30 mins per slide)

  • VirtualBox installation on various operating systems
  • Kali Linux installation on various operating systems
  • Linux terminal basics and command line essentials
  • Aircrack Ng and Crunch setup and their usage examples
  • Denial of Service (DoS) attacks
  • Password cracking in Linux and Windows
  • Router vulnerabilities
  • Social Engineering and website cloning
  • SQL Injection
  • Metasploit and reverse shells

Please make sure that these slides or programs are not copied from any source and it should be based on your own research / learning from the course.