security and ethical hacking online training

security and ethical hacking online training

Enrollmytraining provide security and ethical hacking online training by real time experts in IT industry .We provide security and ethical hacking online training in across the World like India,USA, UK, Singapore, UAE, Australia, Europe, Japan, South Africa,Malaysia, Dubai .The student who had taken security and ethical hacking  training got placed in top MNC’s .We are the top most  security and ethical hacking online training in World Wide.

 

Introduction to Hacking
Hacking
History of Hacking
Necessity of Hacking
Hacking as a Career
Hacking as a Career
Exploit Research/Developer
Reverse-Engineering
Web Application
Malware Analyst
Mobile
Network Penetration Testing
Programming

Algorithmic Approach
Methodology of hacking
Phases of hacking
Reconnaissance
Scanning
Exploitation
Post-exploitation
Track Clearance
Reconnaissance
Introduction to Reconnaissance
Reconnaissance and Foot printing
Open source intelligence gathering
Automating Reconnaissance using scripts
Scanning
Introduction to Scanning
Applying Reconnaissance in Scanning phase
Port scanners, network mappers, sweepers, and vulnerability scanners
Applying Scanning phase on Different platforms

Exploitation
Introduction to Exploits and Payloads
Types of Exploits
Exploits and Exploitation
Evading Antiviruses, IDS and IPS Systems
Exploiting fully patched Operating systems
Packing and Encoding
Backdooring executable

Maintain Access
Persistence backdoors
Maintain persistence on target machine
Connect back backdoors

Post-Exploitation
Extending attack
Pivoting
Running Scripts for profit and fun on target machine
Track Clearance
Clearing Tracks on victims machine
Automating Clearing Tracks using scripts

Metasploit Framework
Introduction to Metasploit Framework
Basic Exploitation
Exploiting Windows
Exploiting Linux
Autopwning
Auxiliary Modules
Meterpreter
Meterpreter Scripting
Railguns
Adding DLL’s and Functions on Fly

Trojans-Bots-Malwares-Viruses
Introduction to Trojans-Bots-Malwares-Viruses
Writing Custom Malware and Trojans
Backdoors
Making Persistence Backdoors
Installing Backdoors on Target machines
Firewall and Anti-virus Evasion

Wireless Hacking
Introduction to WLAN Hacking
Buzz Words
Encryption Types
Basics of WLAN Hacking
From Dummy to virtuoso in Wireless Hacking

Web Application Hacking
Introduction to Web Application Hacking
OWASP TOP 10
Database hacking
Server Hacking
Client and Server side Hacks

Reverse Engineering
Introduction to Reverse Engineering
Compilation Process
Process of Reverse Engineering
Uses of Reverse Engineering
Tools for Trade
Introduction to Intel x86
Data Register Layout
Registers
Working on Mnemonics
Structure Alignment and Structure storage
Function Calls
Binary Disassembly Basics
Reversing Binaries
Writing Keygens
Analyze malwares

Buffer Overflow
Introduction to Buffer Overflow
Buffer Overflow in Linux and Windows
Stack smashing
Writing and executing sample shell code snippets
Memory management
How to smash
Canary Guards
SSP
Static analysis
Safe libraries
Memory address randomization
Exploiting program
Performing Sample Penetration Test on the Target Machine

Exploit Writing
Introduction to Exploit Writing
Writing Shell code for windows and Linux
Buffer Overflow exploitation
Heap Overflows
Browser exploitation
Bypassing DEP ASLR
Format String Attacks
Kernel exploitation
Advanced Exploitation

Scripting and Coding
Introduction to scripting Languages
Coding Snippets
Coding Scripts for automation
Who should attend
students from Students from Computer Science / IT / Electronics, People who are having passion towards Learning of Information Security Education Can Enroll in this course.
Pre-requisites
TCP/IP Concepts
Operating Systems
Familiar with any one programming Language
What you need to bring
Students are required to bring their own laptops with a minimum 4 GB RAM installed.
VMware Workstation / Virtual Box
Wired / Wireless Network Support
At least 40 GB HD free
USB 2 or higher support

Leave a Reply

Your email address will not be published. Required fields are marked *