Ethical Hacking Course Syllabus

Introduction To Ethical Hacking

Hands-on:  Setting up the environment, tools, and networks

Introduction To Penetration Testing

Objective:  In this module, we will be learning about how and why to perform penetration testing. What are all the security measures you have followed?

Topics:

Hands-on:  Installing and configuring protection tools to be anonymous in a network

Setting Up a Penetration Testing and Network Security Lab

Objective:   In this module, we will be learning about how to setup a penetration testing lab for experimenting tools

Topics:

Hands-on:  Installing virtual machine and necessary operating systems for both Attacker and target

Final preparation to begin hacking

Objective:   In this module, we will be learning about operating system basics, commands, scripting, network configuration

Topics :

Hands-on:  Understanding command-line interface with shell scripting

How to Stay Anonymous Before you start Hacking

Objective:  In this module, we will be learning about staying anonymous while browsing, accessing a filesystem

Topics :

Hands-on:   Installing VPN, Tor service and Anonymous browser, evade from firewall and rules

Information Gathering – Getting to Know Your Targets

Objective:  In this module, we will be learning about gathering basic information about a target from different sources. These steps involve manual and automated frameworks.

Topics :

Hands-on:  How to get an IP address, email, software used, version, vulnerabilities, operating system, and miscellaneous data.

Network Scanning and Enumeration

Objective:  In this module, we will be learning about enumerating data from different services In a network and operating system.

Topics :

Hands-on:  When and where to use enumeration tools and how to scan hosts and ports

Vulnerability Scanning and Analysis

Objective:   In this module, we will be learning about how to find vulnerabilities, exploits and how to use them

Topics:

Hands-on:  How to scan an application for vulnerability and exploit using frameworks

Sniffing and Spoofing the Network

Objective:   In this module, we will be learning about how to sniff, analyze packets in a network

Topics :

Hands-on:  How to sniff data using packet capturing tools on windows, Linux, mac

NGROK

Objective:  In this module, we will be learning about port forwarding and its importance.

Topics :

Hands-on:  How to use NGROK command-line tool and forward a specific port

Network-Based Attacks

Objective : In this module, we will be learning about creating exploits and social networking techniques.

Topics :

Hands-on:  How to create custom payload with the listener for windows, Linux, android

Post Exploitation

Objective:  In this module, we will be learning about operating system architecture and operations

Topics :

Hands-on:  How to create a backdoor and operate a shell in the background

Password Cracking Techniques

Objective:  In this module, we will be learning about passwords, hash, cryptography, wordlists

Topics :

Hands-on:  How to obtain hashes using various tools and how to decrypt it

Netcat for Ethical Hacking

Objective:  In this module, we will be learning about reading and writing data in TCP or UDP connections.

Topics :

Hands-on:  How to install and use Netcat with various options and combinations

Social Engineering Attacks

Objective:   In this module, we will be learning about social engineering and its types to exploit humans and not computers.

Topics :

Hands-on:  Installing SEToolkit and creating fake webpage like Gmail, Facebook, Instagram to harvest credentials from users

Android Hacking

Objective:  In this module, we will be learning about android os architecture, vulnerabilities and how to create custom malware for remote administration.

Topics :

Hands-on:  Creating a custom malware using Metasploit Framework and access remotely

Wireless Attacks

Objective:  In this module, we will be learning about how to monitor, hack wifi networks and passwords.

Topics :

Hands-on:  How to install wireless hacking tools, set your nic in monitor mode to scan the networks, obtain the hash, and decrypt the password

Web Application Attacks

Objective:  In this module, we will be learning about how web services work, and identify vulnerabilities.

Topics :

Hands-on:  Turn your pc to web server, setting up a database, and how to use a web vulnerability scanner

Anti Forensics

Objective:  In this module, we will be learning about logs, reports, and evading

Topics :

Hands-on:  How to clear logs and cover your track by using evading tools.