Ethical Hacking and Cyber Security

160 Hours
5/5

Ethical Hacking and Cyber Security

During this training , students will be able to identify vulnerabilities in a system and will be able to fix them as well as they will learn how to exploit into the target system by taking the advantage of vulnerabilities

Overview

In this ethical hacking program by GRRAS, you will be learning the basics of networking along with different operating systems OS and their multiple features, especially Windows and Linux. With the aid of tools of Kali Linux, web applications, and social media, you will learn to find information about people. The path to entering system is learned, which is an important aspect of scanning target or network. You will also learn to enter the system via creating backdoors, which will give you a distinct edge of benefit. Penetration testing systems, software, mobile platforms, password cracking, network, application, and web application are some of the topics covered. Summarizing, you will learn how to fix vulnerabilities, secure systems, set up firewalls and IPS, IDS.

Curriculum

  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts, Types and Phases
  • Ethical Hacking Concepts and Scope
  • Hacking Vs Cracking
  • Information Security Controls
  • Physical Security
  • Incident Management
  • Vulnerability assessment
  • Penetration Testing
  • Information Security Laws and Standards
  • Virtualisation
  • Introduction to Kali Linux
  • Installation of Kali Linux on vm-ware and base machine
  • Installation of Windows on vm-ware
  • Windows VS Linux
  • OS Security And Firewalls
  • IP(ipv4/ipv6)
  • External and Internal ip Address and the Internet
  • MAC
  • LAN ,WAN
  • Wireless Network 
  • Packets 
  • DHCP
  • Ports and 127.0.0.1 
  • DNS
  • Session
  • Cookies
  • Footprinting Concepts
  • Footprinting Methodology
  • Footprinting Tools
  • Footprinting Countermeasures
  • Services and Ports to Enumerate
  • NetBIOS Enumeration
  • Enumeration using Scanning tools
  • NTP Enumeration
  • SMTP Enumeration
  • Vulnerability Assessment
  • Vulnerablity Scoring Systems
  • Vulnerability Scanning
  • Overview of Network Scanning
  • Scanning Methodology
  • Enumeration
  • Services and Ports to Enumerate
  • NetBIOS Enumeration
  • Enumeration using Scanning tools
  • NTP Enumeration
  • SMTP Enumeration
  • Vulnerability Analysis
  • Vulnerability Assessment
  • Vulnerablity Scoring Systems
  • Vulnerability Scanning
  • Evaluating Information for System Hacking
  • System Hacking Goals
  • Hacking Methodology
  • Back Doors, Trojan Horse 
  • Dumpster Diving 
  • Hiding Files Covering Tracks
  • Protect Files and Drives
  • Malware
  • Trojan
  • Virus and Worms
  • Virus Analysis and Detection Methods
  • Malware Analysis
  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning Spoofing Attack
  • DNS Poisoning   
  • Sniffing Tools
  • Sniffing Tool: Wireshark
  • Packet Sniffing Tool: Capsa Network Analyser 
  • Network Packet Analyser
  • Countermeasures Sniffing Detection
  • Social Engineering Concepts
  • Social Engineering Techniques
  • Impersonation on Social Networking Sites
  • Identity Theft
  • DoS/DDos Concepts
  • DoS/DDoS Attack Techniques 
  • Botnets
  • DDoS Case Study
  • Dos/DDos Attack Tools Counter-Measures
  • Dos/DDos Protection Tools DoS/DDos Attack
  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures
  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools Countermeasures, Security Tool
  • Webserver Security Tools
  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web Application Hacking Tools
  • Countermeasures, Security Tool
  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Countermeasures
  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Counter Measures
  • Wireless Security Tools
  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Mobile Device Management
  • Mobile Security Guidelines
  • Introduction to Cloud Computing
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • IDS, Firewalls and honeypot Concepts
  • IDS, Firewalls and honeypot Systems
  • Evading IDS/Firewalls
  • IDS/Firewall Evading Tools 
  • Honeypots 
  • IDS/Firewall Evasion Countermeasures
  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PRI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis Tools 
  • Internet of Things 
  • Understanding IOT Attacks
  • IOT Hacking Methodology
  • Lab Setup
    • Installation of Kali Linux and Windows on VMware
    • Installation of Kali Linux and Windows on Base Machine
    • Installation of Metasploitable on VM-Ware
  • Linux
    • Understanding Linux and Basic Commands
    • File System
    • Users and Groups
    • Permissions
    • Special Permissions
    • ACL
  • Networking
    • Setting up a local network for testing
    • Configuration of network on VM ware
    • Configuring DHCP, Switch, Router
  • FOOTPRINTING TOOLS
    • Maltego Tool
    • Recon-ng
  • Countermeasures of Footprinting
    • Gathering using windows command line utility
    • HTTrack
    • Information Gathering using Metasploit
  • Scanning
    • Hping
    • Nmap
    • Zenmap
  • Enumeration
    • Nmap
    • SuperScan
    • Network Scanner
  • Vulnerability Scanning
    • Nessus Vulnerability Scanning Tool
  • System Hacking
    • Online Tools for Default Passwords
    • Rainbow Table using Winrtgen tool
    • Password Cracking
    • John The Riper
    • cupp
    • Steganography
    • Image Steganography
  • Malware Threats
    • Http RAT Trojan
    • Monitoring TCP/IP connection
  • Sniffing
    • Introduction to Wireshark
    • Using Tcp dump
  • Social Engineering
    • Social Engineering using Kali Linux
    • Social Engineering using Social Media Sites
    • Phishing using Kali Linux
    • Phishing using Web Hosting
  • DOS/DDOS
    • Syn Flooding attack using Hping3
    • Windows tools for DOS
  • IDS/IPS Firewalls
    • Configuring Windows Privacy and Security
    • Configuring Windows Firewalls
    • Configuring Snort on Windows
  • Hacking Web Servers
    • Web Server Footprinting Tool
    • Web server Security Tools
    • Brup Suite
  • SQL Injection
    • Sqlmap
    • Sql Injection Expressions
  • Hacking Wireless Network
    • Wifi Packet Tracing and Capturing Packets using Airecrack-ng
    • Hacking wifi using wps connect
  • Hacking Mobile Platforms
    • Hacking Android Phone using Metasploit
  • Cryptography
    • Example of RSA Algorithm
    • Calculating MD5 using Tools
    • Advance Encryption Package

Course Features

Provide Training Certificates, Internship Letter and Red Hat Participation Certificates.
Support on a daily basis and one to one support with Experienced & Certified Trainers.
 Support on a daily basis and one to one support with Experienced & Certified Trainers.
Students will get placement assistance after the summer training gets completed .
Interview preparation with Mock Interview sessions and HR Round skills will be complimentary for students .
Digital notes,assignments , Soft Copies and PDF's will be provided.
Exam prepration of respective global cetification in the course is included in the training .
Weekly test series will be conducted to enhance competitive environment.
Seminars by professionals and industry experts will be conducted to explain the live working in a company and industry standard working tools.

FAQ

Our Summer Internship modules are designed in such a way that you don’t need to have any specific prior knowledge .Whatever knowledge is required, will be delivered during the training itself. Only your enthusiasm and your will to do is required !
Students (BCA, MCA, B. Tech, M. Tech, MSc-it etc.) who want to make their careers in any IT field , want to do mandatory internship/ training prescribed under the university provisions or the one who has the will to learn and utilise summer time /lockdown time can attend this.
All the Mentors are Certified Industry Experts with vast experience in implementing real-time solutions on different queries related to different topics. They will share their personal industry experience with you while connecting with you .
No doubt , our Online Training Conduction Pattern is same as our Classroom Training pattern. Whether it is the curriculum , way of teaching , way of providing practical exposure ,assignments or projects to the students , we abide by the principle of same teaching pattern in both the training .
For sure , our concern is to pay individual attention and assistance to the students . Hence , you can feel free to ask queries , extra time , doubt solving sessions and assistance in making projects
You just need to have laptop/desktop and proper net connection so that these online training sessions can be conducted without hampering the flow of learning .Proper internet connection speed is required so that disturbance and technical glitches can be avoided during the training .
Candidates need not worry about losing any training session. They will be able to take their missing sessions in extra time by mentor. We also have a technical team to assist the candidates in case they have any query.
Before registering , you can attend one FREE WEBINAR where you can decide to join the course or not. After that, if you are enrolled/ registered in classes and/or have paid fees, but want to cancel the registration due to certain reason, it can be attained within 72 hours of initial registration. Please make a note that refunds will be processed within 30 days of prior request.
Yes, we do provide Placement Assistance with our training courses. You will get assistance in getting job references regarding particular technology and stream of IT . If you’re an undergraduate , then also you can get assistance after you are a graduate by our placement team.

You can enroll to this program following the application process mentioned here:-

Depending upon the area of interest, a candidate can opt the course.

We have limited seats; you can make the payment in the payment link which gets generated to your registered email. 

You will get E-Mail and whole the registration process there.

We do have Cash/ Card/ Paytm/ Google pay etc payment option.

You can pay your fees in installments also.

Reach out to https://grras.com/internship / 9001997178/ 9772165018 in case you do not have a provision to make an online payment or you have any query.

Grras Register

Apply Now For Course

Here You can apply for your Internship program

Grras Register

Have More Queries

If You're confused, which track to chose?

1 Year Diploma Program

Absolutely FREE & 100% JOB GUARANTEE

Get training on Linux, Ansible, Devops ,Python , Networking , AWS and Openstack Cloud by Certified Trainers at GRRAS. You would be able to get the best training along with the interview preparation in this course module .