Ethical Hacking / Cyber Security

Course Descriptions

Currently with effective information security practices, utmost priority is given to keep scanning IT resources for vulnerabilities or attacks which might compromise data security, avoid data loss/thefts and to protect IT resources from risks and misuse. The need for securing information technology concepts alongwith real-time updates and practical sessions ensure that the Ethical Hacking/Cyber Security training offered at Everex Education (LLP) is the best step towards becoming an ethical hacker.

Training Highlights

Everex Education(LLP) has ensured that the course on Ethical hacking covers all aspects that include vulnerabilities, system defenses, penetration testing, vulnerability management, incident management, and defining and implementing security policies. This also makes it the most comprehensive Cyber Security training that is unique and unprecedented in the history of I.T education.

Our emphasis is to ensure that the student gets complete hands-on practical knowledge on all aspects of Cyber security. We train you in testing for chinks in the armor of your network and help protect your network using Ethical Hacking and Penetration Testing Techniques

Course Highlights

Our expert trainers will start from basic fundamentals to the advanced level. Get in-depth knowledge on hacking and penetration testing tools, basics of IT Security, Ethical Hacking and its various concepts.. You will also be taught about Servers, switches, routers and firewall configurations from the security perspective (no other institute offers this in Ethical Hacking courses).

Level 1 – Foundations of Cyber Security
  • Overview of Network Architecture
  • Understanding OSI layers
  • Weakness in the OSI layers and TCP/IP
  • Configuring Cisco Routers and Switches, Checkpoint Firewall and Citrix load balancer.
  • Understanding the security options in the above devices
  • Taking the first steps in Hacking , identifying your targets using Network scanning
  • Identifying IP address location and service provider
  • Understanding the concepts and listing/identifying well-known ports
  • How to check which ports are open and closed
  • How to block/close an open port
  • Probing the targets further using Tools like NMAP, Nessus, Nikto etc.
  • Understanding WMI and SNMP
Level 2 - Footprinting and Enumeration
  • Types of attacks on a system and Networks
  • Different types of Threats
  • The different phases in Hacking Attacks
  • Understanding the importance of footprinting
  • Footprinting and Hacking using the Google hacking database
  • Different types of Search queries used in Google hacking
  • Footprinting using social networking, placement sites, forums and blogs
  • Web site Footprinting , download entire site and scan for information
  • Using DNS, WHOIS and Email header to gather information
  • Using Angry IP scanner to scan the network
  • Scanning using advanced tools like NMAP and HPing 3
  • Enumeration using NETBIOS, SNMP and DNS
  • Social Engineering using fake profiles
Level 3 - Attack the System and Network
  • Hacking a Windows System
  • Cracking the Administrator password at the logon screen
  • Protecting against offline password cracking attacks
  • Defining a DOS and DDOS attack
  • Ping of Death and ICMP flood attack
  • How hackers use Botnets to orchestrate a DDOS attack
  • Detect DDOS attacks and countermeasures
  • Session Hijacking
  • Man-in-the-middle and other attacks
  • Ip spoofing
  • Prevent session hijacking
  • Understanding the use of IPsec
  • Understanding firewall, Router and Switch functionality
  • Demo of Firewall console
  • Creating rules in the firewall
  • Understanding the use of IPS and IDS
Level 4 - Hacking Web Servers and Wireless Networks
  • How does a Web server work
  • Configuring IIS web server
  • Types of Web server attacks
  • Using Metasploit against a Web Server
  • Scanning Web server using MBSA and Nessus
  • Penetration testing of Web Servers
  • SQL injection attacks
  • Cross site scripting attacks
  • Web application firewall eg. Barracuda
  • Hacking Wireless Networks
  • Understanding concepts like SSID, Authentication modes and Encryption
  • Difference between WEP, WPA and WPA2
  • Hacking wireless Networks
  • Cracking wireless encryption
ethical_hacking1.jpg
  • Duration
    : 40 hour
  • Skill level
    : Basic Hardware & Networking
  • Max Students
    : 10
  • Language
    : English, Hindi, Marathi
  • 24*7 online lab access
  • High-end Infrastructure with Xeon Servers
  • Expert Trainers
  • Guaranteed Placements
  • Official Curriculum Books
@