Description
15 Days Ethical Hacking Distance Learning Kit
OVERVIEW:
This Program mainly focuses on the Individuals eager to Ethical Hacking through Distance Education. It features a brief introduction to the world of hacking starting with the importance of ethical hackers and their need in today's world scenario, including to the basics of networking that will help you have a deep understanding of the working of internet.The duration of this module is 15 days. After completion of the Learning Section the Individual have to give examination on any working day within 3 Months, prior he/she has to lock the Examination Date within 2 days of completion of Learning Section.On successful completion of the Program Individual will be provided with Certificate of Distance Learning Program certified by Robosapiens Technologies Pvt. Ltd.
- 1.Duration: 15 Days
- 2.Best Suited For: Individual Eager to Learn Ethical Hacking *
- 3.Fees: 6900/- (Including Courier Charge)
- 4.Project: 31 Experiments cum Projects
- 5.Training Kit: Robosapiens DLK (For details view KIT Tab)
- 6.Delivery: DLK will be delivered to you in 5 working days after receiving your payment
- 7.Examination: You can give exam on any working day within 3 Months#
- 8.Certification: DLC from Robosapiens Technologies Pvt. Ltd.
Course:
Day 1:
Introduction to Ethical Hacking
Day 2:
Introduction to Internet
Live Project 1:Live demonstration of Google dorks.
Live Project 2:Magic of 94FBR
Live Project 3:Hacking through command prompt
Live Project 4:Hacking through a live booting
Day 3:
Phishing
Live Project 5:Creation of free domain
Live Project 6:Facebook account hacking on local server
Live Project 7:Gmail account hacking on local server
Live Project 8:Facebook account hacking on real server
Live Project 9:Gmail account hacking on real server
Steganography
Live Project 10:Hide a text file in an image file
Live Project 11:Hide a text file in an audio/video file
Live Project 12:Hide executable file in an image file
Live Project 13:A scenario showing social engineering attack
Live Project 14:DOS ATTACK on a weak website
Day 5:
Fake Emails
Live Project 15:Sending a fake email
Virus
Live Project 16:Creation of a virus to automatically shutdown the computer
Information Gathering
Live Project 17: Information gathering by NMAP
MITM Attack
Live Project 18:Creation of virtual environment for mitm attack
Live Project 19:Sniffing of username and password from a virtual network
SQL Injection
Live Project 20:Preparation of MySql database & executing basic SQL commands required for hacking
Live Project 21:SQL Injection to hack a website
Day 8:
Introduction to BackTrack
Day 9:
More on Information Gathering
Live Project 24:Information Gathering through LanWhoIs tool.
Worms, Trojans & Backdoor
More on Information Gathering
WIFI Hacking (WEP/WPA2)
DVWA
Live Project 28:XSS attack through DVWA
Live Project 29:SQL Injection attack through DVWA
Session hijacking with Back Track
Session hijacking with Back Track
Day 1:
Introduction to Ethical Hacking
- What is hacking?
- Who is a hacker?
- Kinds of hackers
- What do hackers do?
- Ethical Hacking & Its importance
Introduction to Networking
- What is network?
- Various topologies used in a network
- Networking devices and its working
Day 2:
Introduction to Internet
- Semiconductor Memories
- Importance of internet?
- Difference between intranet and extranet?
- What is Google hacking and its benefits?
Live Project 1:Live demonstration of Google dorks.
Live Project 2:Magic of 94FBR
Windows OS Hacking
- What is meant by Windows hacking?
- What is command prompt in windows?
- Major commands for Windows hacking.
- How to create a bootable pen drive?
Live Project 3:Hacking through command prompt
Live Project 4:Hacking through a live booting
Day 3:
Phishing
- What is phishing?
- How to identify a phishing page?
- How to create a phishing page?
- How to create a local server?
- What is url shortner?
Live Project 5:Creation of free domain
Live Project 6:Facebook account hacking on local server
Live Project 7:Gmail account hacking on local server
Live Project 8:Facebook account hacking on real server
Live Project 9:Gmail account hacking on real server
Day 4:
Steganography
- A big confusion "Steganoraphy or Stenography"
- Types of Steganography
Live Project 10:Hide a text file in an image file
Live Project 11:Hide a text file in an audio/video file
Live Project 12:Hide executable file in an image file
Social Engineering Attack
- What is social engineering attack?
- Impact of Social Engineering Attack?
Live Project 13:A scenario showing social engineering attack
DOS ATTACK
- What are dos attacks?
- 'LOIC 'as a dos attack tool
Live Project 14:DOS ATTACK on a weak website
Day 5:
Fake Emails
- What are fake emails?
- How can we detect fake emails?
Live Project 15:Sending a fake email
Virus
- What is virus?
- What is batch programming
Live Project 16:Creation of a virus to automatically shutdown the computer
Information Gathering
- Importance of Information gathering?
- Tools which can be used?
Live Project 17: Information gathering by NMAP
Day 6:
MITM Attack
- What is man in the middle attack
- MITM attack tools.
Live Project 18:Creation of virtual environment for mitm attack
Live Project 19:Sniffing of username and password from a virtual network
Day 7:
SQL Injection
- What is SQL?
- What is meant by SQL Injection?
- How to search a link vulnerable for SQL injection?
Live Project 20:Preparation of MySql database & executing basic SQL commands required for hacking
Live Project 21:SQL Injection to hack a website
Day 8:
Introduction to BackTrack
- What is Backtrack?
- What is Kali Linux?
Live Project 22:Installation of Backtrack 5
Day 9:
More on Information Gathering
- What is Information Gathering?
- Information Gathering tools
Live Project 23:Gathering Information through Dimitry
Live Project 24:Information Gathering through LanWhoIs tool.
Day 10:
Worms, Trojans & Backdoor
- What are Worms?
- What are Trojans?
- What are Backdoor?
More on Information Gathering
- Website Hacking
Live Project 25:Website Hacking through Havij Tool
Day 12:
WIFI Hacking (WEP/WPA2)
- What is "Wifi Hacking"?
- What is WEP Wifi Hacking?
- What is WPA2 Wifi Hacking?
Live Project 26:Live Wifi Hacking.
Day 13:
DVWA
- What is DVWA?
- Importance of DVWA?
Live Project 27:SQL Injection attack through DVWA
Live Project 28:XSS attack through DVWA
Live Project 29:SQL Injection attack through DVWA
Day 14:
Session hijacking with Back Track
- What is session hijacking?
- Tool used
Live Project 30:Session Hacking through Backtrack
Day 15:
Session hijacking with Back Track
- DNS Spoofing
- What is DNS?
- What is spoofing?
- What is DNS Spoofing?
Live Project 31:Live DNS Spoofing
Project Covered:
- Live demonstration of Google dorks
- Magic of 94FBR
- Hacking through command prompt
- Hacking through a live booting
- Creation of free domain
- Facebook account hacking on local server
- Gmail account hacking on local server
- Facebook account hacking on real server
- Gmail account hacking on real server
- Hide a text file in an image file
- Hide a text file in a audio/video file
- Hide executable file in a image file
- A scenario showing social engineering attack
- DOS ATTACK on a weak website
- Creation of a virus to automatically shutdown the computer
- Sending a fake email
- Information gathering by NMAP
- Creation of virtual environment for session hijacking
- Sniffing of username and password from a virtual network
- Preparation of MySql database & executing SQL commands
- SQL Injection to hack a website
- Installation of Backtrack 5
- Gathering Information through Dimitry
- Information Gathering through LanWhoIs tool
- Website Hacking through Havij
- Live Wifi Hacking
- SQL Injection attack through DVWA
- XSS attack through DVWA
- XSS attack on live website
- Session Hacking through Backtrack
- Live DNS Spoofing
Kit Content:
- Booklet with step by step Instructions
- 5xTool Kit CD
- Other required Tools and accessories etc