Ethical Hacking

 

Popular 100% Job Guaranteed

Ethical Hacking details

Prerequisites : Anyone can learn Web Designing and Development.

Level : Beginner  (By the end of your course become a Professional)

Book Career Guidance at Meultech




    Ethical Hacking   Curriculum

    Duration :  __ Months

    Batches : Weekend and Weekday Batches Available

    Mode : Online and Offline

    Certificate : Available after completing the course and projects.

    Placement : Available

     

    • Module 1 Introduction

      Hacking Concepts, Ethical Hacking Concepts, Basic difference between Hacking and Ethical Hacking, Phases of Hacking, types of hacking and type of heckers, types of OS in Cyber Security.
    • Module 2Getting Started with Kali Linux

      Downloading a Kali ISO Image, In a virtual machine (virtual box, VMware, Dual Booting)
    • Module 3Different OS Installation

      Parrot, Black arch, Sentuko, Black Box, Garuda Linux
    • Module 4The File System

      The File system hierarchy /bin/, /boot/, /dev/, /etc/, /home/, /lib/, /media/, /mnt/, /opt/, /root/, /run/, /sbin/, /srv/, /tmp/, /usr/, /var/, /proc/ and /sys/
    • Module 5OSINT (Open-source intelligence)

      Username, email address, domain name, IP Address, images, videos, docs, social network, instant messaging, people search engines, training, documentation, OpSec, threat intelligence, exploits and advisories, malicious file analysis, tools, encoding and decoding, classifieds, digital currency, dark web, terrorism, mobile emulation, metadata, language translation, archives, forum, blogs, IRC, search engines, geolocation tools/ maps, transportation, business records, public records, telephone numbers, dating.
    • Module 6Social Engineering

      Email phishing, phishing, spear phishing, whaling, social media phishing(Instagram, Facebook, etc.)
    • Module 7Pharming Attack

      What is Pharming attack, steps to avoid pharming attack, URL Crazy, Bits Flipping, Httrack website, Sublist 3r Master, Free domain booking tricks.
    • Module 8System Hacking

      System hacking, different methods of system hacking, security measurement of system hacking, payload creation, payload hiding methods, live example of system hacking and precaution.
     

    Facts

    Facts on Ethical Hacking Course