ETHICAL HACKING
&
Cyber Security
Sessions Name of topics Duration
1 Network concept 4 Hr
• What is Network?
• What is IP and types?
• Network Topology
• Internet working
• Domain Name
• Server
• Ports and Types of Ports
• Introduction to Web Browser
2 Ethical hacking & cyber security & overview 30 Min
• Cybercrime scenario in India and worldwide
• Short description about hacking vs. Ethical hacking
• Skill Profile of a Hacker
• Some Famous Hackers and Groups
• Cyber World
• Advantage and Disadvantage of Cyber world
• Types of Hackers
• Classes of Hacker
• Who is a Hacker
• Security Challenges
• Skills required for an Ethical Hacker
3 Overview of cyber law 2 Hr
• Introduction to Cyber Law
• Cyber Laws Indian
• Technical Aspect of Indian Cyber Law
• IT ACT 2000 & 2008
• Internet Crimes and Frauds
• Cyber Law Cases in India
• Organization Under Cyber Laws
• Advantages Of Cyber Laws
4 Computer virtualization technology & lab setup 4 Hr
• Need & Advantage Of Virtualization
• Requirements for virtualization
• Creating virtual machines and optimization performance
• Installing OS (Windows and Linux) On Virtual Machines
• Virtual networking what and why?
5 Information gathering 8 Hr
• What Is Information Gathering & Why Hackers Need This?
• Types of Information Gathering
• Information Gathering Using Websites
• Information Gathering Using Software
• Search Engines- Smart Way of Information Gathering
• Ping
• Who-is Lookup
• People Search
• DNS Lookup
• Benefits of Foot printing
6 Windows, Linux hacking & security 4 Hr
• Introduction Windows Security
• User Accounts Security, Attacks and countermeasure
• Hacking into System by Changing Passwords
• Getting Access to System by Elevating Privileges
• Finding Out the Passwords of Windows
• Bypassing the Windows Security
7 Data recovery 4 Hr
8 Steganography and cryptography 2 Hr
9 Desktop exploitation & data hiding 30 Min
10 Fake calling & SMS 1 Hr
11 Mobile phone 4 Hr
• Use of mobile in hacking
• Hidden function of mobile
• Backdoor Attack
12 Denial of service attack (DOS – attack) 2 Hr
• What is a Denial of Service Attack?
• What is Distributed Denial of Service Attacks?
• DoS Attack Techniques
• Detail Study on DoS Attack Tools
13 Hacking by viruses, Trojans, key loggers 4 Hr
• What is viruses?
• What is Trojan?
• Trojans/viruses Attack
• Different way a Trojan Can Get Into A System
• How Attacker Bypass Your Antivirus By Trojans
14 VPN technology 2 Hr
• Proxy and Types of Proxies
• Why Hackers Use Proxy?
• How to Hide IP Address While Chatting
• How to Open Block Website in College/Companies
• Convert Your Machine as Proxy Server with HTTPS Proxy
• Advantage and Disadvantage of Proxy
• How Proxy Hack Your Passwords Etc.
• What Is VPN?
• Why We Use VPN
• Advantage & Disadvantage of VPN
• Free VPN
15 Google hacking and Google hacking database 4 Hr
Introduction and Working of Search Engines
List of Common Search Engines on Web
Comparing and Choosing Best Search Engine
Google for Hacking Search Engines
Finding Admin Pages and Weakness in Site
Security against Search Engine Hacking
16 E-mail/social sites hacking and security issues 4 Hr
Analysis Email Attacks (Live Demo) Manually &
Automatic
Cookies Stealing (Session Hijacking) of All Big Mail
Servers
Phishing Attacks (Normal & Advanced)
Analyzing Fake & Real Profiles & Email Accounts
Fake Mailing Attack
Email & Fake Profile Tracing
Facebook Phishing Attacks
Facebook Account security with Email & SMS
Notification.
17 SQL Injection 4 Hr
SQL Injection Attacks
How Web Applications Work?
SQL Injection Detection
Types of SQL Injection
How to Defend Against SQL Injection Attacks..??
18 Wireless hacking 2 Hr
Wireless Standards
Common Vulnerabilities in Wireless Devices
Encryption Standards Used in Wi-Fi
WEP Cracking
WPA/WPA2 Cracking
WPS Cracking
Solve Security challenges
19 Linux training 10 Hr
what is Linux & how to operate this OS
use of Linux
Wi-Fi cracking & security
Pentesting (Site Cloning)
Network find
Network scanning
DNS Hacking (Server hacking)
What is DNS.??
DNS Attack
FACEBOOK/Any Mail id HACKED!!!
Security
Wi-Fi jammer
Armitage
NMAP
terminal function
……. many more hacking
20 Security 4 Hr
Facebook/mail Account Security
WhatsApp Security
Android phone Security
21 Cyber crime case study 8 Hr
Introduction to cyber crime and investigation
Types of cyber crimes
Investigation Rules
….many more case study
Total @ 78HR
Total Course Duration – 78 Hours