Are you Looking for Customized Syllabus?
We are also providing customized syllabus to the students according to their needs and projects requirements for the cons.
Get 1-to-1 Live Instructor Led Online Training in flexible timings
Attend our Instructor Led Online Virtual Classroom
Course Overview
If you are considering working in the cybersecurity industry, then ethical hacking courses will benefit you greatly as you prepare for an offensive security role. With SS IT Software Online Training's online ethical hacking course, you will learn how to protect your network from malicious hackers by learning to exploit networks yourself.
Ethical hacking courses provide individuals with a deep understanding of cybersecurity, its concepts, and its practical applications. Students learn various tools and techniques used in the industry to secure computer systems, and how to detect and respond to cyber attacks.
Prerequisites:
Ethical Hacking doesn’t require any prerequisite however having knowledge about Networking Basics will be an additional advantage to understand the concepts easily.
Course Duration: 45 Hours
Module 1: Introduction to Information Security
Chapter 1.1: Information Security Overview
Chapter 1.2: Information Security Attack and Threats vendors
Chapter 1.3: Hacking
Chapter 1.4: Ethical Hacking Concepts
Chapter 1.5: Controls of Information Security
Chapter 1.6: Physical Security
Chapter 1.7: Risk
Chapter 1.8: Threat Modeling
Chapter 1.9: Incident Management
Chapter 2.1: FootPrinting Concepts
Chapter 2.2: FootPrinting through the Search Engines
Chapter 2.3: Foot Printing using Web Services
Chapter 2.4: Website FootPrinting and Email FootPrinting
Chapter 2.5: DNS FootPrinting and Network FootPrinting
Chapter 2.6: FootPrinting Tools
Chapter 2.7: FootPrinting Counterattacks and Pen Testing
Chapter 3.1: Network Scanning Basics
Chapter 3.2: Network Scanning Tools
Chapter 3.3: Network Scanning Techniques
Chapter 3.4: Network Diagrams
Chapter 3.5: Scanning IDS, Firewall, and Pen Testing
Chapter 4.1: Enumeration Basics
Chapter 4.2: NETBIOS Enumeration
Chapter 4.3: SNMP and LDAP Enumeration
Chapter 4.4: NTP Enumeration, SMTP Enumeration, and DNS Enumeration
Chapter 4.5: Additional Enumeration Techniques
Chapter 4.6: Enumeration Counterattacks and Pen Testing
Chapter 5.1: Vulnerability Assessment Concepts
Chapter 5.2: Vulnerability Assessment Solutions
Chapter 5.3: Vulnerability Scoring Systems
Chapter 5.4: Vulnerability Assessment Tools
Chapter 5.5: Vulnerability Assessment Reports
Chapter 6.1: CEH Hacking Methodology (CHM)
Chapter 6.2: System Hacking Objectives
Chapter 6.3: Password Cracking
Chapter 6.4: Kinds of Password Attacks
Chapter 6.5: Password Recovery Tools
Chapter 6.6: Microsoft Authentication
Chapter 6.7: Storing Hash Passwords in Windows SAM
Chapter 6.8: NTLM Authentication Process
Chapter 6.9: Kerberos Authentication
Chapter 6.10: Password Salting and Cracking Tools
Chapter 6.11: Tools for Extracting the Password Hashes
Chapter 6.12: How to Defend against LLMNR/NBT-NS Poisoning and Password Cracking
Chapter 6.13: Escalating Privileges
Chapter 6.14: Tools to Execute Applications
Chapter 6.15: Keylogger
Chapter 6.16: Spyware
Chapter 6.17: How to Defend against Keylogger and Spyware
Chapter 6.18: RootKits
Kinds of Rootkits
RootKits working
Steps to Detect RootKits
Defend Against RootKits
Anti-RootKits
Chapter 6.19: NTFS Data Stream
Chapter 6.20: Steganography
Chapter 6.21: Covering Tracks
Chapter 7.1: Malware Fundamentals
Chapter 7.2: Trojan Basics
Chapter 7.3: Worms and Virus Concepts
Chapter 7.4: Malware Analysis
Chapter 7.5: Counterattacks
Chapter 7.6: Anti-Malware Software
Chapter 7.7: Malware Penetration Testing
Chapter 8.1: Sniffing Basics
Chapter 8.2: MAC Attacks
Chapter 8.3: Sniffing Technique: DHCP Attacks
Chapter 8.4: Sniffing Technique: ARP Poisoning
Chapter 8.5: Spoofing Attacks
Chapter 8.6: DNS Poisoning and Sniffing Tools
Chapter 8.7: CounterAttacks and Sniffing Detection Techniques
Chapter 9.1: Social Engineering Basics and Techniques
Chapter 9.2: Impersonation on Social Networking Sites
Chapter 9.3: Identity Theft and Counterattacks
Chapter 9.4: Social Engineering Penetration testing and Insider Threats
Chapter 10.1: DoS and DDoS Concepts
Chapter 10.2: DoS and DDoS Attack Techniques
Chapter 10.4: Botnets and DDoS Case Study
Chapter 10.5: DoS and DDoS Attack Tools and Counterattacks
Chapter 10.6: DoS and DDoS protection tools and Penetration Testing
Chapter 11.1: Session Hijacking Basics
Chapter 11.2: Application Level Session Hijacking
Chapter 11.3: Network Level Session Hijacking
Chapter 11.4: Session Hijacking Tools and Counterattacks
Chapter 11.5: IPsec
Chapter 12.1: Intrusion Detection System
Chapter 12.2: Firewall
Chapter 12.3: Intrusion Detection Tools
Chapter 12.4: Firewalls
Chapter 12.5: Honeypots and Honeypot Tools
Chapter 12.5: IDS Evasion Methods
Chapter 12.6: Firewall Evasion Techniques
Chapter 12.7: IDS or Firewall Evading Tools
Chapter 12.8: Detecting Honeypots
Chapter 12.9: IDS and Firewall Evasion Counterattacks
Chapter 12.10: Penetration Testing
Chapter 13.1: Web Servers Basics
Chapter 13.2: Web Server Attacks
Chapter 13.3: Web Server Attack Methodology and Web Server Footprinting or Banner Grabbing
Chapter 13.4: Website Mirroring and Vulnerability Scanning
Chapter 13.5: Web Server Attack Tools
Chapter 13.6: Counterattacks
Chapter 13.7: Patch Management
Chapter 13.8: Web Server Security Tools
Chapter 13.9: Web Server Penetration Testing
Chapter 14.1: Web App Concepts
Chapter 14.2: Web App Threats
Chapter 14.3: Hacking Methodology
Chapter 14.4: Web Application Hacking Tools and Countermeasures
Chapter 14.5: Web App Security Testing Tools and Web App Pen Testing
Chapter 15.1: SQL Injection Concepts
Chapter 15.2: Types of SQL Injection and SQL Injection Methodology
Chapter 15.3: SQL Injection Tools and Evasion Techniques
Chapter 15.4: Counterattacks
Chapter 16.1: Wireless Fundamentals
Chapter 16.2: Wireless Encryption
Chapter 16.3: Wireless Threats and Wireless Hacking Methodology
Chapter 16.4: Wireless Hacking Tools
Chapter 16.5: Bluetooth Hacking
Chapter 16.6: Counterattacks and Wireless Security Tools
Chapter 16.7: Wi-Fi Penetration Testing
Chapter 17.1: Mobile Platform Attack Vendors
Chapter 17.2: Hacking Android OS
Chapter 17.3: Hacking iOS
Chapter 17.4: Mobile Spyware and Mobile Device Management
Chapter 17.5: Mobile Security Guidelines and Tools
Chapter 17.6: Mobile Penetration Testing
Chapter 18.1: IoT Fundamentals
Chapter 18.2: IoT Attacks
Chapter 18.3: IoT Hacking Methodology and IoT Hacking Tools
Chapter 18.4: Counterattacks and IoT Penetration Testing
Chapter 19.1: Cloud Computing Basics
Chapter 19.2: Cloud Computing Threats and Attacks
Chapter 19.3: Cloud Security and Cloud Security Tools
Chapter 19.4: Cloud Penetration Testing
Chapter 20.1: Cryptography Basics and Encryption Algorithms
Chapter 20.2: Cryptography Tools
Chapter 20.3: Public Key Infrastructure and Email Encryption
Chapter 20.4: Disk Encryption and Cryptanalysis
Chapter 20.5: Counterattacks
We are also providing customized syllabus to the students according to their needs and projects requirements for the cons.
Learning a technology with a professional who is well expertise in that solve 60% of your needs.
We are dead cheap in fees. We are having options to make the payment in instalments as well if needed.
If you are in dilemma to choose a course, we are having experts in counselling team to help you with perfect projection of your career.
We support any training should be more practical apart from theoretical classes. So, we always gives you hands-on training.
We satisfied 10000+ students from the day we started SSIT Software Online Training. Take a look of our old student’s video reviews and it says all.
We have every course material to understand which is prepared by our trainers and we will share with you after session completes.