Ethical Hacking Industrial Training and Online Classes by Deepak Smart Programming
Introduction
Course Syllabus
Ethical Hacking at times called as Penetration Testing is a demonstration of interrupting/entering into framework or systems to discover dangers, vulnerabilities in those frameworks which a noxious aggressor may discover and misuse causing loss of information, budgetary misfortune or other real harms. The main reason to have knowledge of ethical hacking is to improve the security of the system or frameworks by fixing the vulnerabilities discovered amid testing. Ethical programmers may utilize similar techniques and apparatuses utilized by the malevolent programmers yet with the authorization of the approved individual to improve the security and shielding the frameworks from assaults by vindictive clients. Ethical programmers are relied upon to report every one of the vulnerabilities and shortcoming discovered amid the procedure to the administration.

    • 1. OUTLINE OF ETHICAL HACKING
    • ⇒ Types of Hacking

    • ⇒ Advantages of Hacking

    • ⇒ Disadvantages of Hacking

    • ⇒ Why we do Hacking

    • 2. TYPES OF HACKERS
    • ⇒ White Hat Hackers

    • ⇒ Black Hat Hackers

    • ⇒ Grey Hat Hackers

    • ⇒ Miscellaneous Hackers

    • 3. FAMOUS ETHICAL HACKERS
    • 4. NOMENCLATURE USED IN ETHICAL HACKING
    • 5. TOOLS ASIST WITH ETHICAL HACKING
    • 6. ABILITIES FOR ETHICAL HACKING
    • ⇒ Basic Skills

    • ⇒ Courses & Certifications

    • 7. PROCEDURE OF ETHICAL HACKING
    • ⇒ Ethical Hacking

    • 8. ETHICAL HACKING ?EXAMINE
    • 9. ETHICAL HACKING - IMPRESSION
    • ⇒ Information of Domain Name

    • ⇒ Finding IP Address

    • ⇒ Finding Hosting Company

    • ⇒ IP Address Ranges

    • ⇒ History of the Website

    • 10. THUMBPRINTS IN ETHICAL HACKING
    • ⇒ Basic Steps

    • ⇒ Port Examine

    • ⇒ Cleaning of ping

    • ⇒ DNS count

    • 11. SNIFFING IN ETHICAL HACKING
    • ⇒ Types of Sniffing

    • ⇒ Hardware Protocol Evaluator

    • ⇒ Rules

    • 12. SNIFFING TOOLS IN ETHICAL HACKING
    • 13. ARP POISONING.ETHICAL HACKING
    • ⇒ What is ARP Spoofing?

    • ⇒ What is MITM?

    • ⇒ ARP Poisoning Practice

    • 14. DNS POISONING IN ETHICAL HACKING
    • ⇒ DNS Poisoning ? Practice

    • ⇒ Weaponry against DNS Poisoning

    • 15. USING OF ETHICAL HACKING
    • 16. ENUMERATION IN ETHICAL HACKING
    • 17. METASPLOIT OF ETHICAL HACKING
    • ⇒ Job of Metasploit

    • ⇒ Charges of Metasploit

    • 18. TROJAN ATTACKS IN ETHICAL HACKING
    • 19. TCP/IP SKYJACKING IN ETHICAL HACKING
    • 20. EMAIL SKYJACKING IN ETHICAL HACKING
    • ⇒ Email Spoofing

    • ⇒ Social Skyjacking

    • ⇒ Virus Insertion in a User System

    • 21. PASSWORD HACKING IN ETHICAL HACKING
    • ⇒ Dictionary Attack

    • ⇒ Hybrid Dictionary Attack

    • ⇒ Brute-Force Attack

    • ⇒ Rainbow Tables

    • 22. WIRELESS HACKING IN ETHICAL HACKING
    • ⇒ Kismet

    • ⇒ NetStumbler

    • ⇒ Wired Equivalent Privacy

    • ⇒ Wireless DoS Attacks

    • 23. SOCIAL HANDLING IN ETHICAL HACKING
    • 24. DDOS ATTACKS IN ETHICAL HACKING
    • ⇒ What are Botnets?
    • ⇒ Types of DDoS Attacks
    • 25. CROSS-SITE SCRIPTING.IN ETHICAL HACKING
    • 26. SQL INJECTION IN ETHICAL HACKING
    • 27. PEN TESTING IN ETHICAL HACKING
Batches Details

  • Duration

    2-3 Months
  • Available Seats

    15
  • Online Training Schedule

    8.00 pm to 10.00 pm
  • Industrial Training Schedule in Chandigarh

    8.00 am to 7.00 pm
    (2 hours per batch)


Register in Ethical Hacking Course

If you want to take online/offline classes from us, please mail us directly