An Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). This course certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
"To beat the hacker, you need to think like a hacker"
Contents of this Course :-
1. Basics of Ethical Hacking
- laws of ethical hacking
- network layers.
- understanding the OS, BIOS, Kernel.
- Networking Concepts : TCP/IP, DHCP, ARP, MAC, etc.
2. Footprinting, Reconnaissance and Scanning Target
- Terms and Introduction, Objective
- Understanding LAN, Wireless Connections.
- Finding Victims on Network using Tools.
- Countermeasures
3. System Hacking
- Windows all versions password cracking.
- Understanding the Security: NTLM, LM authentication.
- Using spywares, malwares, trojans to hack windows.
- Defend aganist all such attacks.
4. Android Hacking
- Understanding how Android works.
- Understanding ways to get into it.
- Hacking smartphones using old_browser_hang technique.
- Buffer Overflow attacks
- Attacking iphone using memory corruption
- Hacking Android to get live camera stream.
5. Securing Oneself
- CaseStudy : ATM hacks
- CaseStudy : RansomeWare Attack ( WarCry )
- Cryptography
- How to stay secured ?
- Prevent being hacked