date

Start date

November 2021

duration

Duration

10 Weeks

enrol

Enrol now

Book your seat

Your career in Ethical Hacking awaits you

The next batch starts in:

What is this course about?

The best way to secure your web assets is to learn how an attacker or hacker will attack. In this Ethical Hacking and Penetration testing course, you will have a hands-on experience under the supervision of our expert tutor regarding the administrative controls, technical controls, and physical controls as well as study confidentiality, integrity, availability of data, and other basics of ethical hacking. You will also learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

What is this course about?

The best way to secure your web assets is to learn how an attacker or hacker will attack. In this Ethical Hacking and Penetration testing course, you will have a hands-on experience under the supervision of our expert tutor regarding the administrative controls, technical controls, and physical controls as well as study confidentiality, integrity, availability of data, and other basics of ethical hacking. You will also learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

Become an Ethical Hacking
Expert in just 10 weeks

Become an Ethical Hacking
Expert in just 10 weeks

Course Curriculum

Here is what's included in this Ethical Hacking and Penetration Testing Course

– Basic Terminologies

– Current Security Issues and requirement for testing

– Hacking Concepts

– Penetration Testing

– Difference between Ethical Hacking and Penetration Testing

– Hacking Phases

– Security and Defense in Depth

– Overview of Security and Controls

– Vulnerability Assessment

– Laws for Ethical hacking and Penetration Testing

– Scope of Penetration Testing

– Documentation techniques for penetration testing

– Understanding reconnaissance and footprinting

– Understanding different techniques for NetBIOS Enumeration

– Understanding different techniques for SNMP enumeration

– Understanding different techniques for LDAP enumeration

– Footprinting using whois

– Footprinting using search engine

– Introduction to Shodan

– Footprinting using Shodan

– Footprinting using GHDB

– Email footprinting

– Website footprinting

– Network footprinting

– DNS footprinting

– Introduction to social engineering

– Whois

– Shodan.io

– Whois.domaintools.com

– didtheyreadit

– haveibeenpwned

– nslookup

– recon-ng

– pOf

– Google Dork

– Google hacking database

– Netdiscover

– Angry IP scanner

– The harvester

– Hunter.io

– Scanning Concept

– Techniques to see Online systems

– Port Scanning

– Nmap Script Engine (NSE)

– IDS and Firewall Evasion Techniques

– Understanding Network Posture

– Changing Mac Address

– Spoofing

– Masscan

– Nmap

– Zenmap

– Macchanger

– Vulnerability of the management life cycle

– Vulnerability analysis with automated tools.

– Vulnerability Score

– Nessus

– OpenVas

– Nmap

– OWASP-ZAP

– Nikto

– Malware and its types

– Malware detection mechanism

– Introduction to Virustotal

– Ways to make malware undetected

– Virustotal

– No-distribute

– Understanding Metasploit framework

– Using auxiliaries

– Using payload

– Using Exploits

– Importing public exploits

– Privilege Escalation techniques

– Creating payloads/malware

– Metasploit

– Armitage

– Exploit-db

– Understanding Man in the middle concept

– Understanding Sniffing

– Understanding MAC Attack and MAC Spoofing

– Understanding ARP Poisioning

– Understanding DNS Poisoning

– Wireshak

– Network Miner

– Bettercap

– Macchanger

– Wireless encryption algorithm

– Wireless handshake capturing

– Cracking

– Capturing handshake in virtual environment

– Aircrack-ng

– Bettercap

– Hashcat

-Crackstation.net

– Understanding DOS Attack

– Understanding DDOS Attack

– Understanding Botnet

– LOIC (Low Orbit ION Cannon)

– HULK

– Understanding session hijacking

– Wireshark

– Understanding web server working and attack methodology

– Metsploit

– Nmap

– Nikto

– Dirbuster

– Gobuster

– Understanding web application vulnerabilities

– Web Application vulnerability exploitation

– Web application hacking/testing using Burpsuite

– Application level session hijacking

– Burpsuite

– SQLmap

– XSSER

– OWASP-ZAP

– Nikto

– Dirbuster

– Gobuster

– Understanding mobile hacking (Android)

– Metasploit

– FatRat

– L3mon

– IOT concepts

– IOT hacking using sessions grabbing

– Metsploit

– Nmap

– Understanding cloud computing

– Understanding cloud computing threats and attacks

– Understanding Cryptography

– Understanding Symmetric and Asymmetric Encryption techniques

– Understanding Email Security and testing

– Making a professional penetration testing report

Course Curriculum

Here is what's included in this Ethical Hacking and Penetration Testing Course

– Basic Terminologies

– Current Security Issues and requirement for testing

– Hacking Concepts

– Penetration Testing

– Difference between Ethical Hacking and Penetration Testing

– Hacking Phases

– Security and Defense in Depth

– Overview of Security and Controls

– Vulnerability Assessment

– Laws for Ethical hacking and Penetration Testing

– Scope of Penetration Testing

– Documentation techniques for penetration testing

– Understanding reconnaissance and footprinting

– Understanding different techniques for NetBIOS Enumeration

– Understanding different techniques for SNMP enumeration

– Understanding different techniques for LDAP enumeration

– Footprinting using whois

– Footprinting using search engine

– Introduction to Shodan

– Footprinting using Shodan

– Footprinting using GHDB

– Email footprinting

– Website footprinting

– Network footprinting

– DNS footprinting

– Introduction to social engineering

– Whois

– Shodan.io

– Whois.domaintools.com

– didtheyreadit

– haveibeenpwned

– nslookup

– recon-ng

– pOf

– Google Dork

– Google hacking database

– Netdiscover

– Angry IP scanner

– The harvester

– Hunter.io

– Scanning Concept

– Techniques to see Online systems

– Port Scanning

– Nmap Script Engine (NSE)

– IDS and Firewall Evasion Techniques

– Understanding Network Posture

– Changing Mac Address

– Spoofing

– Masscan

– Nmap

– Zenmap

– Macchanger

– Vulnerability of the management life cycle

– Vulnerability analysis with automated tools.

– Vulnerability Score

– Nessus

– OpenVas

– Nmap

– OWASP-ZAP

– Nikto

– Malware and its types

– Malware detection mechanism

– Introduction to Virustotal

– Ways to make malware undetected

– Virustotal

– No-distribute

– Understanding Metasploit framework

– Using auxiliaries

– Using payload

– Using Exploits

– Importing public exploits

– Privilege Escalation techniques

– Creating payloads/malware

– Metasploit

– Armitage

– Exploit-db

– Understanding Man in the middle concept

– Understanding Sniffing

– Understanding MAC Attack and MAC Spoofing

– Understanding ARP Poisioning

– Understanding DNS Poisoning

– Wireshak

– Network Miner

– Bettercap

– Macchanger

– Wireless encryption algorithm

– Wireless handshake capturing

– Cracking

– Capturing handshake in virtual environment

– Aircrack-ng

– Bettercap

– Hashcat

-Crackstation.net

– Understanding DOS Attack

– Understanding DDOS Attack

– Understanding Botnet

– LOIC (Low Orbit ION Cannon)

– HULK

– Understanding session hijacking

– Wireshark

– Understanding web server working and attack methodology

– Metsploit

– Nmap

– Nikto

– Dirbuster

– Gobuster

– Understanding web application vulnerabilities

– Web Application vulnerability exploitation

– Web application hacking/testing using Burpsuite

– Application level session hijacking

– Burpsuite

– SQLmap

– XSSER

– OWASP-ZAP

– Nikto

– Dirbuster

– Gobuster

– Understanding mobile hacking (Android)

– Metasploit

– FatRat

– L3mon

– IOT concepts

– IOT hacking using sessions grabbing

– Metsploit

– Nmap

– Understanding cloud computing

– Understanding cloud computing threats and attacks

– Understanding Cryptography

– Understanding Symmetric and Asymmetric Encryption techniques

– Understanding Email Security and testing

– Making a professional penetration testing report

Entry Requirements

Basic level of networking, Knowledge of operating virtual machines, basics of programming (especially web development.)

Meet Our Trainers

Our experienced Ethical Hacking and Penetration Testing expert are here to help you understand the concepts of ethical hacking and to apply them practically for your successful career 

Osaid Raza

Osaid Raza

Manager Information Security, Financial Institute in Pakistan
MS Computer Systems Network Security Hamdard University

Benefits of the course

hacking1

Learn to get into the minds of the hackers and pre-emptively protect your online assets

hacking2

Enhance your knowledge about vulnerabilities and risk

hacking3

Safeguard businesses and prevent any unnecessary losses

more-questions

More Questions?

Get in touch

More Questions?

Get in touch