Learn the nuances of Ethical Hacking
Ethical Hacking is the process of breaking into an organization's IT networks and systems to test their weakness and vulnerabilities. There are five phases in hacking. They include reconnaissance, gaining access, enumeration, maintaining access, and covering tracks. Hackers use various hacking tools and techniques in each of these phases.
Ethical hackers conduct vulnerability assessment, risk assessment, penetration testing and system protection tests and fix security issues before they are exploited by hackers with malicious intent.
WHAT WILL YOU LEARN?
-
Introduction to Ethical Hacking, Information security threats and attack vectors, Hacking Terminologies, Concepts, Types and Phases, Ethical Hacking concepts and scope, Information Security controls -
Footprinting concepts and Objectives, Footprinting through search engines, Footprinting through social networking sites, Website footprinting, Email footprinting
-
WHOIS footprinting, Network footprinting, DNS footprinting, Footprinting through social Engineering, Countermeasures
-
Overview of network scanning, Scanning Methodology, Check for live system
-
Check for open Ports, Banner Grabbing, Network diagrams, Countermeasures
-
Enumeration concepts, NetBIOS Enumeration, SNMP Enumeration, LDAP Enumeration
-
NTP Enumeration, SMTP and DNS Enumeration, Countermeasures
-
System Hacking Methodology, Gain Unauthorized Access, Escalating Privileges
-
Keylogger, Executing Applications, Hiding files, Covering Tracks, Countermeasures
-
Introduction to Malware, various malware and threat
-
Trojan Concepts, Virus, stages of virus and Worms, , Countermeasures
-
Sniffing Concepts, MAC Attacks, DHCP Attacks
-
Spoofing Attack, ARP poisoning, DNS Poisoning, Countermeasures
-
Social Engineering Concepts, Social Engineering Techniques
-
Impersonation on social Networking Sites, Identify Threat, Social engineering Countermeasures
-
DoS/DDoS Concepts, Dos/DDOs Attack Techniques, Botnets, Countermeasures
-
Session hijacking Concepts, Network Level Session Hijacking
-
Application Level Session Hijacking, Tools and Countermeasures
-
Web Server concepts, Attack Methodology, Web Server Attacks, Countermeasures
-
Web Application Concepts, Web App Threat, Hacking Methodology, Countermeasures
-
SQL Injection concepts, SQL Injection Methodology, Types of SQL Injection
-
SQL Injection Tools, Evasion Techniques, Countermeasures
-
Wireless Concepts, Wireless Encryption, Wireless Threats
-
Wireless Hacking Methodology, Hacking Wireless Networks, Countermeasures
-
Mobile Platform Attack vectors, Hacking Mobile Platforms, Hacking Android OS
-
Mobile device Management, Mobile security guidelines, Countermeasures
-
IDS Firewall and Honeypot concepts, Evading IDS, Detecting Honeypots
-
Firewall and Honeypot solutions, Countermeasures
-
Introduction to cloud Computing, Cloud computing Threats
-
Cloud Computing Attacks, Cloud Security, Cloud Countermeasures
-
Cryptography concepts, Encryption Algorithms, Public Key Infrastructure (PKI), Disk Encryption, Cryptography Attacks, Countermeasures
-
Case study
Why LIVEWIRE?
-
CERTIFICATION
-
Get trained through an ISO certified institute. Our course completion certificate and material are globally recognized. Skill based certification provided which will add value in resume
-
-
CERTIFIED FACULTIES
-
All our trainer are Certified in their Products. B2E certified Industry experienced faculty. They ensure students are benefited with in depth practical training.
-
-
PLACEMENT OPPORTUNITY
-
LIVEWIRE is in association with 250+ corporates, who grab candidates from our centres when they match their job requirement. We offer all these opening to the students. They will be able to directly apply for the openings through our Student Portal.
-
-
Individual focus
-
Learn the required skill
-
We will guide you on one-mini project
-
Real time application training
DELIVERABLES
-
Material for future reference
-
Internationally recognized Course Completion certificate
-
Skill based Certificate
-
Discounted price for future Upgrade trainings.
-
Best Guidance for your Career
Job opportunities
-
After the completion of this training one can aim at becoming
-
IT Security Specialist
-
IT Security Consultant
-
Penetration Tester
-
Computer Forensics Analyst
-
Intrusion Analyst
-
Infosec Analyst
-
Cyber Security Engineer
-
Computer Network Defense (CND) Analyst / Auditor
-
CND Infrastructure Support / Incident Responder
-
Businesses & Hiring Managers
-
Homeland Security Specialist
-
IT Auditor
-
Site Administrator
Who can Enroll?
Graduates with basic computer skills and strong Knowledge in TCP/IP can benefit from the course and student/Professional concerned with secure programming and the integrity of the network infrastructure.
Request for Demo
