Learn the basics of ethical hacking and cyber security with the best online ethical hacker course in India. This training program is designed for beginners and covers core topics, hacking methodologies, tools, techniques, and more.
This ethical hacker course is the starting point that equips you with the fundamental skills required to build a strong foundation. Book your demo class now to get started!
Upcoming Batch Details
DurationTimings
(Mon – Sat) 45 days | 9:00 AM to 10:00 AM |
(Mon – Sat) 45 days | 10:00 AM to 11:00 AM |
(Mon – Sat) 45 days | 4:00 PM to 5:00 PM |
(Mon – Sat) 45 days | 5:00 PM to 6:00 PM |
(Mon – Sat) 45 days | 6:00 PM to 7:00 PM |
Complete Course Breakdown:
Section 1: Foundations of Ethical Hacking
• Mastering Notekeeping
• Effective Notekeeping Strategies
• The Art of Taking Screenshots
Section 2: Networking Essentials
• Networking Refresher
• Understanding IP Addresses
• Decoding MAC Addresses
• TCP, UDP, and the Three-Way Handshake
• Exploring Common Ports and Protocols
• Demystifying the OSI Model
• Subnetting Simplified
Section 3: Setting Up Your Lab Environment
• Installing Virtualization Tools (VMWare/VirtualBox)
• Configuring Your Virtual Environment
• Deploying Kali Linux for Penetration Testing
Section 4: Ethical Hacking Methodology
• Overcoming Common Setup Challenges
• The Five Stages of Ethical Hacking
Section 5: Information Gathering (Reconnaissance)
• Passive Reconnaissance Techniques
• Identifying and Profiling Your Target
• Discovering Email Addresses
• Gathering Breached Credentials with Breach-Parse
• Hunting Credentials with DeHashed
• Uncovering Subdomains: Part 1 & 2
• Identifying Website Technologies
• Leveraging Burp Suite for Information Gathering
• Mastering Google Fu
• Utilizing Social Media for OSINT
Section 6: Scanning & Enumeration
• Advanced Scanning with Nmap
• Enumerating HTTP and HTTPS Services
• SMB and SSH Enumeration Techniques
• Researching Potential Vulnerabilities
• Interactive Section Quiz
Section 7: Vulnerability Scanning with Nessus
• Comprehensive Scanning with Nessus: Part 1 & 2
Section 8: Exploitation Basics
• Reverse Shells vs. Bind Shells
• Staged vs. Non-Staged Payloads
• Gaining Root Access with Metasploit
• Manual Exploitation Techniques
• Executing Brute Force Attacks
• Credential Stuffing and Password Spraying
Section 9: Capstone Project
• Introduction to Capstone Projects
• Setting Up and Walking Through Various Scenarios
• Blue Team Setup & Walkthrough
• Academy Setup & Walkthrough
• Active Directory Overview
Section 10: Active Directory Lab Build
• Lab Overview and Requirements & Cloud-Based Lab Alternatives
• Downloading Necessary ISOs
• Setting Up the Domain Controller
• Configuring User Machines
• Establishing Users, Groups, and Policies
• Joining Machines to the Domain
• Initial Attack Vectors on Active Directory
Section 11: Post-Compromise Enumeration in Active Directory
• Advanced Enumeration
Section 12: Post-Compromise Attacks in Active Directory
• Pass Attacks Overview and Execution
• Dumping and Cracking Hashes
• Mitigating Pass Attacks
• Token Impersonation Tactics
• LNK File Attacks
• Attacks and Mitigations
• Credential Dumping
• Developing a Post-Compromise Strategy
Section 13: Domain Compromise Strategies
• Post-Domain Compromise Attack Strategies
• Dumping
• Golden Ticket Attacks Explained
• Advanced Active Directory Attacks o
• (CVE-2021-1675) Walkthrough
Section 14: Active Directory Case Studies
• Real-World AD Case Study
Section 15: Post Exploitation Techniques
• Introduction to Post Exploitation
• Reviewing File Transfers
• Maintaining Access Strategies
• Pivoting Techniques and Walkthroughs
• Cleaning Up After Exploits
Reviews
There are no reviews yet.