Online Training

CEH

Course Outline

  •  Module 01: Introduction to Ethical Hacking.
  • Module 02: Footprinting and Reconnaissance.
  • Module 03: Scanning Networks
  • Module 04: Enumeration.
  • Module 05: System Hacking
  • Module 06: Trojans and Backdoors.
  • Module 07: Viruses and Worms.
  • Module 08: Sniffers
  • Module 09: Social Engineering.
  • Module 10: Denial of Service
  • Module 11: Session Hijacking
  • Module 12: Hacking Webservers
  • Module 13: Hacking Web Applications
  • Module 14: SQL Injection
  • Module 15: Hacking Wireless Networks
  • Module 16: Evading IDS, Firewalls, and Honeypots
  • Module 17: Buffer Overflow
  • Module 18: Cryptography
  • Module 19: Penetration Testing
  • Module 20: Mobile Hackign and Forensics training

Pre-Requisite: Basic Knowledge of Networking

Course Duration: 60 Hours (30 Days – 2 Hours Per Day)

Training Method: Official Stuy Material, Audio and Video (HD) Tutorials, Query Sessions, Live Online Training, Live Project Based Training, Online labs and Practicals

Web Penetration Testing

Course Outline

  • Module 01: Introduction to Web-Application penetration Testing Introduction to Web-Application penetration Testing
  • Module 02: Introduction to OWASP
  • Module 03: HTTP Basic
  • Module 04: Web Application Cookies And Session Management
  • Module 05: SQL Injection
  • Module 06: Testing for SQL Injection
  • Module 07: Information Gathering
  • Module 08: HTML Injection
  • Module 09: Command Injection
  • Module 10: File Upload
  • Module 11: Web Shells
  • Module 12: LFI/RFI
  • Module 13: Open Redirects
  • Module 14: Cross Site Scripting
  • Module 15: CSRF
  • Module 16: Burp Suite Exploitation
  • Module 17: Automated Penetration Testing
  • Module 18: Insecure Direct Object Reference
  • Module 19: Fire Addon

Pre-Requisite: Knowledge of Ethical Hacking, Networking.

Course Duration: 90 Hours (45 Days – 2 Hours Per Day)

Training Method: Official Stuy Material, Audio and Video (HD) Tutorials, Query Sessions, Live Online Training, Live Project Based Training, Online labs and Practicals.

Network Penetration Testing

Course Outline

  • Module 01: Introduction to Network Penetration Testing
  • Module 02: Wireshark
  • Module 03: NMAP Basics
  • Module 04: Nmap Firewall Scan
  • Module 05: Metasploit
  • Module 06: Dictionary & Passwords Attacks
  • Module 07: FTP Penetration Testing (Port 21)
  • Module 08: SSH Penetration Testing (Port 22)
  • Module 09: Telnet Penetration Testing (Port 23)
  • Module 10: SMTP Penetration Testing (Port 25)
  • Module 11: DNS & DHCP Penetration Testing (Port 53, 67, 68)
  • Module 12: NetBIOS & SMB Penetration Testing (Port 135-445)
  • Module 13: SNMP Penetration Testing (Port 161, 162)
  • Module 14: MSSQL Penetration Testing (Port 1433)
  • Module 15: MySQL Penetration Testing (Port 3306)
  • Module 16: Remote Desktop Penetration Testing (Port 3389)
  • Module 17: VNC Penetration Testing (Port 5900, 5901)
  • Module 18: Sniffing & Spoofing
  • Module 19: Socks Proxy Penetration Testing
  • Module 20: IDS, Firewall, Honeypots<
  • Module 21: DOS Attack Penetration Testing
  • Module 22: Covering Tracks & Maintaining access
  • Module 23: Network Vulnerability Assessment Tool

Pre-Requisite: Knowledge of Ethical Hacking, Networking.

Course Duration: 90 Hours (45 Days – 2 Hours Per Day)

Training Method: Official Stuy Material, Audio and Video (HD) Tutorials, Query Sessions, Live Online Training, Live Project Based Training, Online labs and Practicals

CTF challenge

Course Outline

  • Module 01: Nmap
  • Module 02: Directory brute force attack
  • Module 03: Web application attacks
  • Module 04: WordPress penetration testing
  • Module 05: Password Cracking
  • Module 06: Netcat
  • Module 07: Metasploit Framework
  • Module 08: Wireshark
  • Module 09: Various Reverse shell
  • Module 10: Spawingtty shell
  • Module 11: Windows and Linux Privilege Escalation
  • Module 12: File transfer
  • Module 13: Misconfigured Lab setup
  • Module 14: Basic Programming Skills
  • Module 15: Capture NTLM Hashes in Network
  • Module 16: MSSQL Penetration Testing using Nmap
  • Module 17: MS-SQL Penetration Testing lab Setup
  • Module 18: ICMP Protocol with Wireshark
  • Module 19: TCP UDP packet analysis
  • Module 20: Pivoting
  • Module 21: SMTP Pentest Lab Setup
  • Module 22: NetBIOS and SMB Penetration Testing
  • Module 23: Linux and Windows Environment
  • Module 24: Linux and Windows Commands
  • Module 25:CTF challenges [100 labs]

Pre-Requisite: Knowledge of Ethical Hacking, Networking.

Course Duration: 90 Hours (45 Days – 2 Hours Per Day)

Training Method: Official Stuy Material, Audio and Video (HD) Tutorials, Query Sessions, Live Online Training, Live Project Based Training, Online labs and Practicals.