eLearningCurve

Empowering Minds, Anywhere, Anytime

WhatsApp

+91 77750 32347

Call Us

+91 90750 24452

Ethical Hacking

About This Course

This 16-week intensive program trains students in penetration testing, vulnerability assessment, and cybersecurity defense. It covers ethical hacking methodologies, tools, and real-world cyberattack simulations to prepare learners for roles in cybersecurity, penetration testing, and security analysis.

Why Choose This Program?

Who Should Enrol

Curriculum

12 Modules

  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
    Ethical Hacking Concepts
  • Information Security Controls
  • Penetration Testing Concepts
  • Information Security Laws and Standards
  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website,Email, DNS, Network, Whois Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Pen Testing
  • Network Scanning Concepts   
  • Scanning Tools & Techniques  
  • Scanning Beyond IDS and Firewall 
  • Banner Grabbing    
  • Draw Network Diagrams   
  • Scanning Pen TestingENUMERATION   
  • Enumeration Concepts    
  • NetBIOS Enumeration    
  • SNMP, LDAP, NTP Enumeration  
  • DNS Enumeration    
  • Other Enumeration Techniques   
  • Enumeration Countermeasures    
  • Enumeration Pen Testing  
  • Vulnerability Assessment Concepts & Solutions 
  • Vulnerability Scoring Systems   
  • Vulnerability Assessment Tools & Reports 
  • And configuration of hadoop 
  • System Hacking Concepts   
  • Cracking Passwords    
  • Escalating Privileges    
  • Executing Applications    
  • Hiding Files    
  • Covering Tracks    
  • Penetration Testing   
  • Malware & Trojan Concepts  
  • Virus and Worm Concepts  
  • Malware Analysis    
  • Anti-Malware Software    
  • Malware Penetration TestingSNIFFING   
  • Sniffing Concepts    
  • Sniffing Technique: MAC & DHCP 
  • Sniffing Technique: ARP & DNS 
  • Sniffing Technique: Spoofing Attacks  
  • Sniffing Tools    
  • Countermeasures     
  • Sniffing Detection Techniques   
  • Sniffing Pen Testing  
  • Social Engineering Concepts & Techniques 
  • Insider Threats    
  • Impersonation on Social Networking Sites 
  • Identity Theft    
  • Countermeasures     
  • Social Engineering Pen Testing 
  • DoS/DDoS Concepts & Techniques  
  • Botnets     
  • DoS/DDoS Attack Tools   
  • Countermeasures     
  • DoS/DDoS Protection Tools & Penetration 
  • Session Hijacking Concepts   
  • Application Level & Network Level 
  • Session Hijacking Tools   
  • Countermeasures     
  • Penetration Testing   
  • IDS, Firewall and Honeypot Concepts 
  • Evading IDS & Firewalls  
  • Detecting Honeypots    
  • IDS/Firewall Evasion Countermeasures   
  • Penetration Testing   
  • Web Server Concepts   
  • Web Server Attack Methodology & 
  • Patch Management    
  • Web Server Security Tools  
  • Web Server Pen Testing 
  • Web App Concepts   
  • Web App Threats   
  • Hacking Methodology    
  • Web App Hacking Tools  
  • Countermeasures     
  • Web App Security Testing Tools 
  • Web App Pen TestingsSQL INJECTION 
  • SQL Injection Concepts   
  • Types of SQL Injection  
  • SQL Injection Methodology   
  • SQL Injection Tools   
  • Evasion Techniques    
  • Countermeasures    
  • Wireless Concepts    
  • Wireless Encryption    
  • Wireless Threats    
  • Wireless Hacking Methodology   
  • Wireless Hacking Tools   
  • Bluetooth Hacking    
  • Countermeasures     
  • Wireless Security Tools   
  • Wireless Pen Testing  
  • Mobile Platform Attack Vectors  
  • Hacking Android OS   
  • Hacking iOS    
  • Mobile Spyware    
  • Mobile Device Management   
  • Mobile Security Guidelines and Tools 
  • Mobile Pen TestingCLOUD COMPUTING  
  • Cloud Computing Concepts   
  • Cloud Computing Threats & Attacks 
  • Cloud Security    
  • Cloud Security Tools   
  • Cloud Penetration Testing   
  • Module - 19: Cryptography  
  • Cryptography Concepts    
  • Encryption Algorithms    
  • Cryptography Tools    
  • Public Key Infrastructure (PKI)  
  • Email Encryption    
  • Disk Encryption    
  • Cryptanalysis    
Preview This Course

Rs. 14,999/-

Rs. 26,999/-

Job Profile to Work

Program Structure

Placement Support

Learning Outcome