loading......

coming soon

Coming Soon

We are in process of building the inventory of good professionals in this category

Got it!

Where do you need ?

location

Please select a Location.

Enquire

Submit your enquiry for Learn Ethical Hacking in 16 hours

Please enter valid question or comment

Please enter your name.

Please enter valid email

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Prashant

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer

Share

Learn Ethical Hacking in 16 hours

Learn Ethical Hacking in 16 hours

Velacheri, Chennai

1,200

No Reviews Yet
3 Interested

About the Course


This level will start totally from core basics. Here we will be more focused on understanding what exactly a computer is and how it functions as per software perspective. It is totally like if you want to perform something unusual, you need to understand the system more than a normal user. Even if you are not from computer engineering background, this course aims to teach from scratch.

After that we will perform some real-life hacking techniques and we will excel towards the path an ethical hacker does.

Topics Covered

The course contents are described below:

Module 0 -Some pre-requisite setup required for hacking
• Operating System Introduction
• Live CD Operating Systems and Distributions
• Introduction to Virtualization
• Implementing Virtualization
• Basics of Networking
• Implementing Networking Concepts in Virtualization
• Setting up PC for hacking practice

Ethical hacking Concepts
• Module 1 - Introduction to Ethical hacking
o Difference between hacking and Ethical Hacking
o Types of hackers
o Phases of conducting hacking
o Case studies

• Module 2 -Ethics and Rules
o Hackers and hacking methodology
o Malicious hacker strategy
o Steps to conduct Ethical hacking
o Hiding your identity while you hack

• Module 3 -Information gathering and Scanning
o Get to know how hackers gather information about the target
o Information gathering on websites
o Scanning website
o Finding admins

• Module 4 -Google Hacking
o What is Google?
o Using google as hacking tool
o Finding vulnerability website using Google
o Using special operators


o Live attacks performed by malicious hackers.

• Module 5 -Scanning using tools
o IPScanner
o Nmap
o Generating reports.

• Module 6 -Sniffing
o What is sniffing
o Types of sniffing
o Using weakness of hardware device
o Using sniffing to get sensitive data
o Man in the middle attack

• Module 7 -Introduction to Malware(Malicious Software)
o Malware Unleashed
o Detailed Study of Virus, Worms, Trojan Horse
o Technique to check whether your antivirus is working properly or not.
o How anti-virus work

• Module 8 -Introduction to Cryptography
o Encryption
o Decryption
o Demo on Cryptography
o Creating secured password protected area in Harddisk

• Module 9 -Trojans
o Creation of Trojan
o Hiding Trojan in a legitimate program
o Gaining control on others system.
o Detection and removal of Trojans
o Live hacking in LAN Environment

• Module 10 -Rootkits
o Defining rootkits
o Identifying rootkits in system
o Removal and avoidance

• Module 11 -Email Hacking
o Tracing an email
o Email bombing
o Using phishing page
o Keyloggers

• Module 12 -System Hacking
o Windows Password hacking
o Steganography
o File hiding technique

• Module 13 -Social Engineering and Clearing the Tracks

Bonus level – Ethical hacking implementations
Be a super spy like tom cruise of mission impossible.
• Self-accessible webcam
• Webcam surveillance system
• Find your stolen laptop
• Make your own laptop anti-theft system
• Phone call forgery
• Creating a fake website of a legitimate website
• Creating and tracking of what user is performing in the system

21 ways to hack and secure email

• Normal ways to hack email account remotely
• Local ways to hack email account
• Advanced ways normally done by detective agency
• Email mass spreading ways
• Email password and data security
• Using anonymous mails

Who should attend

Anyone who is passionate to learn something different.
Anyone who want to be different in the field of IT.
Anyone who wants to defeat bad hackers.
Anyone who wants to secure yourself from the cyberspace attacks.

Pre-requisites

All you must know how to surf the internet and email.
Networking knowledge can add an advantage

What you need to bring

Laptop (Preferred)."

Key Takeaways

By the end of the day you will be well equipped to defeat bad hackers.
Study Material
2 DVDs containing tools for practicing hacking demonstrated with videos.
You will get a different identity in the field of IT.
Lots of friends and a team.
Reviews
There are no Reviews yet. Be the First to Review
Questions and Comments

Thousands of experts Tutors, Trainers & other Professionals are available to answer your questions

Comment ?

Questions Guidelines

  • Start your question with simple statements like "what", "when", "where", or "how".
  • Ensure your question or answer is not offensive or insensitive - it may be voted down or banned.
  • Please provide as much detail as possible as this will allow our members to better understand and respond to your question.
  • Take some time to categorize your question. This will greatly help other users find the question.


You can add upto 6 Images

Ask

Showing 1 to 10 of 66
U

Deepa Arul 02/07/2014

Hi mail me your phone no.to get in touch with you reg. the ethical hacking course.

0 0

Answer

You can add upto 6 Images

U

praveen 28/06/2014

pls send ur contact adress and number.....

0 0

Answer

You can add upto 6 Images

U

Gopal 28/04/2014

If u r interested to learn Ethical Hacking and Cyber Crime Investigator course contact

0 0

Answer

You can add upto 6 Images

U

karthick 18/04/2014

I am interested in learning ethical hacking.Please send me your address or contact number.

0 0

Answer

You can add upto 6 Images

U

shajakan 29/03/2014

please send ur address. i need more details about hacking.and also i need the fees package and duration

0 0

Answer

You can add upto 6 Images

U

Kathir 06/03/2014

Please send your address to communicate. Also tell me the duration of the course.

0 0

Answer

You can add upto 6 Images

U

barath 22/02/2014

I want address in chennai to learn hacking

0 0

Answer

You can add upto 6 Images

U

UDAYAKUMAR 08/02/2014

please give me your address to visit to study

0 0

Answer

You can add upto 6 Images

U

Satish 04/02/2014

Hi i like to learn EH can you reply me back

0 0

Answer

You can add upto 6 Images

U

abhinav parab 03/02/2014

I want to learn ethical hacking, will you please mail your address

0 0

Answer

You can add upto 6 Images


There are no Reviews yet. Be the First to Review

Date and Time

Not decided yet.

About the Trainer

Prashant Nair

Ethical Hacker (CEH from EC-COUNCIL USA)


I have been taking training on ethical hacking, penetration testing, computer forensics, cloud computing, programming, virtualization.

I am a freelance consultant in the field of security and defense planning and mechanisms.

I had worked with various detective agencies all over India as a freelancer for solving cyber crime cases and evidence collection.
Seats Left-

Students Interested 3

Course Id: 3392