Ethical Hacking and Penetration Testing

 >>  Ethical Hacking and Penetration Testing

Ethical Hacking and Penetration Testing


 (4.8) | 450 Ratings


Introduction


Ethical Hacking and Penetration Testing Details
Track Regular Track Weekend Track Fast Track
Course Duration 35 Hrs 8 Weekends 5 Days
Hours 1hr/day 2 Hours a day 6 Hours a day
Training Mode Online Classroom Online Classroom Online Classroom
Delivery Instructor Led-Live Instructor Led-Live Instructor Led-Live


Course Curriculum

Ethical Hacking & Penetration Testing Introduction

  • Introduction to Ethical Hacking.
  • Hands on Linux / Ubuntu.
  • Hands on Windows Command Line tools.
  • Protocols.
  • Internet Governance.
  • Reconnaissance.
  • Google Hacking.
  • Scanning.
  • Enumeration.
  • System Hacking.
  • Proxies Servers.
  • Key loggers.
  • Trojans and Backdoors.
  • Viruses and Worms.
  • Sniffing.
  • Social Engineering.
  • Email Hacking
  • Hacking Routers.
  • Session Hijacking.
  • Hacking Web servers.
  • SQL Injection.
  • XSS Attacks (Cross-site Scripting).
  • CSRF Attacks (Cross-site Request Forgery).
  • DOS and DDOS attack
  • RFI and LFI.
  • Buffer Overflows.
  • Reverse Engineering.
  • Cryptography.
  • Firewalls.
  • Physical Security.
  • Wireless Hacking.
  • Metasploit.
  • Mobile Hacking.
  • Web Application Penetration Testing
  • 34 A) WAPT- Basics/Introduction
  • 34 B) WAPT- OWASP TOP 10

Exam & Certification

0

Course Review

(4.8)
5 stars
4 stars
3 stars
2 stars
1 stars

Course Curriculum

Ethical Hacking & Penetration Testing Introduction

  • Introduction to Ethical Hacking.
  • Hands on Linux / Ubuntu.
  • Hands on Windows Command Line tools.
  • Protocols.
  • Internet Governance.
  • Reconnaissance.
  • Google Hacking.
  • Scanning.
  • Enumeration.
  • System Hacking.
  • Proxies Servers.
  • Key loggers.
  • Trojans and Backdoors.
  • Viruses and Worms.
  • Sniffing.
  • Social Engineering.
  • Email Hacking
  • Hacking Routers.
  • Session Hijacking.
  • Hacking Web servers.
  • SQL Injection.
  • XSS Attacks (Cross-site Scripting).
  • CSRF Attacks (Cross-site Request Forgery).
  • DOS and DDOS attack
  • RFI and LFI.
  • Buffer Overflows.
  • Reverse Engineering.
  • Cryptography.
  • Firewalls.
  • Physical Security.
  • Wireless Hacking.
  • Metasploit.
  • Mobile Hacking.
  • Web Application Penetration Testing
  • 34 A) WAPT- Basics/Introduction
  • 34 B) WAPT- OWASP TOP 10

    Click here for Help and Support: info@sacrostectservices.com     For Inquiry Call Us:   +91 996-629-7972(IND)

  +91 996-629-7972(IND)
X

Quick Enquiry

X

Business Enquiry