• Previous
    15 Days 8051 Embedded Systems Distance Learning Kit
  • Next
    15 Days Machine Vision with Matlab Distance Learning Kit

15 Days Ethical Hacking Distance Learning Kit

In Stock
6,900.00
Product Code: RM1511

Delivered In: 2-7 Business days

Description

15 Days Ethical Hacking Distance Learning Kit

Product Description : This Program mainly focuses on the Individuals eager to Ethical Hacking through Distance Education. 

OVERVIEW:
This Program mainly focuses on the Individuals eager to Ethical Hacking through Distance Education. It features a brief introduction to the world of hacking starting with the importance of ethical hackers and their need in today's world scenario, including to the basics of networking that will help you have a deep understanding of the working of internet.The duration of this module is 15 days. After completion of the Learning Section the Individual have to give examination on any working day within 3 Months, prior he/she has to lock the Examination Date within 2 days of completion of Learning Section.On successful completion of the Program Individual will be provided with Certificate of Distance Learning Program certified by Robosapiens Technologies Pvt. Ltd.
  • 1.Duration: 15 Days
  • 2.Best Suited For: Individual Eager to Learn Ethical Hacking *
  • 3.Fees: 6900/- (Including Courier Charge)
  • 4.Project: 31 Experiments cum Projects
  • 5.Training Kit: Robosapiens DLK (For details view KIT Tab)
  • 6.Delivery: DLK will be delivered to you in 5 working days after receiving your payment
  • 7.Examination: You can give exam on any working day within 3 Months#
  • 8.Certification: DLC from Robosapiens Technologies Pvt. Ltd.
 
Course:
Day 1:
Introduction to Ethical Hacking
  • What is hacking?
  • Who is a hacker?
  • Kinds of hackers
  • What do hackers do?
  • Ethical Hacking & Its importance

 

Introduction to Networking
  • What is network?
  • Various topologies used in a network
  • Networking devices and its working

 


Day 2:
Introduction to Internet
  • Semiconductor Memories
  • Importance of internet?
  • Difference between intranet and extranet?
  • What is Google hacking and its benefits?


Live Project 1:Live demonstration of Google dorks.
Live Project 2:Magic of 94FBR

 

Windows OS Hacking
  • What is meant by Windows hacking?
  • What is command prompt in windows?
  • Major commands for Windows hacking.
  • How to create a bootable pen drive?


Live Project 3:Hacking through command prompt
Live Project 4:Hacking through a live booting

 


Day 3:
Phishing
  • What is phishing?
  • How to identify a phishing page?
  • How to create a phishing page?
  • How to create a local server?
  • What is url shortner?


Live Project 5:Creation of free domain
Live Project 6:Facebook account hacking on local server
Live Project 7:Gmail account hacking on local server
Live Project 8:Facebook account hacking on real server
Live Project 9:Gmail account hacking on real server

 

Day 4:
Steganography
  • A big confusion "Steganoraphy or Stenography"
  • Types of Steganography


Live Project 10:Hide a text file in an image file
Live Project 11:Hide a text file in an audio/video file
Live Project 12:Hide executable file in an image file

 

Social Engineering Attack
  • What is social engineering attack?
  • Impact of Social Engineering Attack?


Live Project 13:A scenario showing social engineering attack

 

DOS ATTACK
  • What are dos attacks?
  • 'LOIC 'as a dos attack tool


Live Project 14:DOS ATTACK on a weak website

Day 5:
Fake Emails
  • What are fake emails?
  • How can we detect fake emails?

Live Project 15:Sending a fake email

Virus
  • What is virus?
  • What is batch programming


Live Project 16:Creation of a virus to automatically shutdown the computer

Information Gathering
  • Importance of Information gathering?
  • Tools which can be used?


Live Project 17: Information gathering by NMAP

 

Day 6:
MITM Attack
  • What is man in the middle attack
  • MITM attack tools.


Live Project 18:Creation of virtual environment for mitm attack
Live Project 19:Sniffing of username and password from a virtual network

 

Day 7:
SQL Injection
  • What is SQL?
  • What is meant by SQL Injection?
  • How to search a link vulnerable for SQL injection?


Live Project 20:Preparation of MySql database & executing basic SQL commands required for hacking
Live Project 21:SQL Injection to hack a website

Day 8:
Introduction to BackTrack
  • What is Backtrack?
  • What is Kali Linux?

 

Live Project 22:Installation of Backtrack 5
Day 9:
More on Information Gathering
  • What is Information Gathering?
  • Information Gathering tools

 

Live Project 23:Gathering Information through Dimitry
Live Project 24:Information Gathering through LanWhoIs tool.

 

Day 10:
Worms, Trojans & Backdoor
  • What are Worms?
  • What are Trojans?
  • What are Backdoor?
Day 11:
More on Information Gathering
  • Website Hacking

 

Live Project 25:Website Hacking through Havij Tool

 

Day 12:
WIFI Hacking (WEP/WPA2)
  • What is "Wifi Hacking"?
  • What is WEP Wifi Hacking?
  • What is WPA2 Wifi Hacking?

 

Live Project 26:Live Wifi Hacking.

 

Day 13:
DVWA
  • What is DVWA?
  • Importance of DVWA?

 

Live Project 27:SQL Injection attack through DVWA
Live Project 28:XSS attack through DVWA
Live Project 29:SQL Injection attack through DVWA

 

Day 14:
Session hijacking with Back Track
  • What is session hijacking?
  • Tool used

 

Live Project 30:Session Hacking through Backtrack

 

Day 15:
Session hijacking with Back Track
  • DNS Spoofing
  • What is DNS?
  • What is spoofing?
  • What is DNS Spoofing?

 

Live Project 31:Live DNS Spoofing

 

 
Project Covered:
  • Live demonstration of Google dorks
  • Magic of 94FBR
  • Hacking through command prompt
  • Hacking through a live booting
  • Creation of free domain
  • Facebook account hacking on local server
  • Gmail account hacking on local server
  • Facebook account hacking on real server
  • Gmail account hacking on real server
  • Hide a text file in an image file
  • Hide a text file in a audio/video file
  • Hide executable file in a image file
  • A scenario showing social engineering attack
  • DOS ATTACK on a weak website
  • Creation of a virus to automatically shutdown the computer
  • Sending a fake email
  • Information gathering by NMAP
  • Creation of virtual environment for session hijacking
  • Sniffing of username and password from a virtual network
  • Preparation of MySql database & executing SQL commands
  • SQL Injection to hack a website
  • Installation of Backtrack 5
  • Gathering Information through Dimitry
  • Information Gathering through LanWhoIs tool
  • Website Hacking through Havij
  • Live Wifi Hacking
  • SQL Injection attack through DVWA
  • XSS attack through DVWA
  • XSS attack on live website
  • Session Hacking through Backtrack
  • Live DNS Spoofing
 
Kit Content:
  • Booklet with step by step Instructions
  • 5xTool Kit CD
  • Other required Tools and accessories etc

 

Downloads

Reviews (0)

Write a review

Note: HTML is not translated!
    Bad           Good
Note : Images shown is only for representation. The actual product may vary with the picture shown.