Signup as a Tutor

As a tutor you can connect with more than a million students and grow your network.

Learn Ethical hacking

No Reviews Yet

Ellisbridge, Ahmedabad

Course ID: 9016

Ellisbridge, Ahmedabad

Students Interested 0 (Seats Left 0)

₹ 10,000

No Reviews Yet

Date and Time

Not decided yet.

NITISH MEHTA

B.TECH IN CS

About NITISH MEHTA

I have been taking classes" from past 1years.
No reviews currently

About the Course

Technical Education should have practical approach.

India has vast number of college and universities providing technical education, but major students are lacking on having a proper practical approach to their subjects which leads to failure or struggle in fieldwork. We bridge the gap between theoretical knowledge and practical implementation by workshops and give a complete industrial training by our industrial training.

Topics Covered


221, Devnadan Mall , Nr. Town Hall , Ashram road , Ahmedabad.

Certified Cyber security Expert

Basic Level Ethical Hacking
Introduction
Introduction to Hacking
• Hackers & hacking methodologies
• Types of hackers
• Steps to conduct Hacking

Information Gathering & Scanning Methodologies
• Method of gathering information
• Information gathering of websites &networks
• Scanning & Structuring of websites
• Finding Admin Panel of websites
CASE STUDY and TASK
- Who Uploaded this Video

Google Hacking
• What is Google Hacking
• Advanced operators of Google
• Finding Vulnerable websites using Google
• Finding Target networks using Google

CASE STUDY
- How My Website Got Hacked?
TASK
- What is happening at USA?
- Avast Key is

Basic Network Terminologies
1. TCP/IP protocols
2. IP protocols
3. Classes of IP address
4. NAT
5. VPN , Proxies , SSH ,PUTTY

Scanning & Enumeration
1. Scanning
2. Types
3. Tools
4. NMAP , ZenMap

Trojans,
Backdoors

1. How to control victim’s computer using Trojans
2. Binding Trojans
3. Undetected Trojans
4. Removal of Trojans from computer
5. Analysis of Trojans/ Virus


Virus & Worms
1. Introduction to viruses and worms
2. How they work?
3. Method used to hide them
Facebook and Email Hacking

1. Using Techniques
• Phishing
• Desktop phishing
• Tabnabbing
• Various Other techniques
2. Spoofing E-mails
3. Tracing E-mails
4. Finding vulnerability in facebook
5. Reporting vulnerability in Facebook
Wireless Hacking & Security 1. Wireless Protocols
2. Wireless Routers-Working
3. Attacks on Wireless Routers
4. Cracking Wireless routers password(WEP) and (WPA)
5. Securing routers from Hackers
6. Countermeasures
Website Hacking & Security

1. Vulnerability Research
2. SQL Injection 1
3. SQL Injection 2
4. XSS Attacks & Countermeasures
5. LFI/ RFI Attacks & Countermeasures
6. Information Disclosure Vulnerabilities
7. Buffer Overflow Attacks 1
8. Buffer Overflow Attacks 2
9. Session Hijacking Attcks
10. Hacking Web Servers
11. Vulnerability Assessment & Penetration Testing
12. Exploit Writing
13. Secure Coding Practice


Advanced Level Ethical Hacking
Mobile Security
1. SMS Forging & Countermeasures
2. VoIP Hacking & Countermeasures
• INSTALLING
• FORGING VOIP CALLS
3. BLUETOOH HACKING
• Introduction
• Protocols
• Types of attacks
• Bluejacking
• Tools for bluejack
• BlueSpam
• Blue snarfing
• BlueBug attack
• Shortpair code attack
• Man in Middle attack
• Tools that aid bluetooh hacking
• Countermesurement
Introduction to Cyber Crime Investigation & IT ACT 2000
1. Types of crime
2. Introduction Of IT acts
3. Case Studies of Reported
DO IT yourself
1. Google Dork
2. Hacking a website
3. Torjan Making
4. Phishing Page
5. Email Spoofing and Tracing
6. Cracking a Wifi Password
7. Create your Virus
8. Solve Dummy Cases
9. Make a incident Report
10. Explaining The risk of the Hacking


Mock Interview Session

Interview preparation guidance
Resume preparation
Machine Test

Program Benefits & Highlights:
• Hands on Demonstrations
• Hands on Practice Everyday
• PowerPoint Presentation, Live Demos, Interactive Question & Answer sessions
• Reading Materials and Tools will be given


Duration:
• 2 MONTHS
FEES:
• 10,000 INR


Course Material & CDs:
• Comprehensive course material will be provided to participants.
• Tools and tutorials will be Provided /

Certification:
• Certificate of “Certified Cyber Security Expert” will be given to participants from Illuminative Works.
• Certificate of Completion Of Task and training will be given
• Certificate Of Completion Of Training will be given

Who should attend

12TH PASS.
Any graduate.

Pre-requisites

only know Basic internet.

What you need to bring

nothing

Key Takeaways

Program Benefits & Highlights:
• Hands on Demonstrations
• Hands on Practice Everyday
• PowerPoint Presentation, Live Demos, Interactive Question & Answer sessions
• Reading Materials and Tools will be given

Reviews

No reviews currently

Students Interested 0 (Seats Left 0)

₹ 10,000

Post your requirement and let us connect you with best possible matches for Computer Software Classes Post your requirement now
₹ 10,000 Enquire