An ethical hacker (also known as a white hat hacker) is the ultimate security professional. Ethical hackers know how to find and exploit vulnerabilities and weaknesses in various systems—just like a malicious hacker (or a black hat hacker). In fact, they both use the same skills; however, an ethical hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in.

An ethical hacker’s role is similar to that of a penetration tester, but it involves broader duties. They break into systems legally and ethically. This is the primary difference between ethical hackers and real hackers—the legality.

 

 

Duration: -

60 Hours

 

Who Can take this course – Target Audience: -

  • 10th & 12th class students
  • Undergraduates, Graduates and Post-Graduates
  • Post graduate students – BCA, MCA, B.Tech , M.Tech
  • Security officers, Auditors, Security professional’s site administrators

 

Pre-requisites for the Class: -

  • Basic Computer Knowledge

 

Course Content: -

Networking Concept
 

  • What is Network?
  • What is IP and types?
  • Internet working
  • Domain Name
  • Electronic Mail
  • Architecture and Services
  • Ports and Types of Ports
  • Introduction to Web Browser
  •  

Ethical Hacking and Cyber Security and overview
 

  • Cybercrime scenario in India and worldwide
  • Short description about hacking vs Ethical hacking
  • Skill Profile of a Hacker
  • Some Famous Hackers and Groups
  • Cyber World
  • Advantage and Disadvantage of Cyber world
  • Types of Hackers
  • Classes of Hacker
  • Who is a Hacker
  • Security Challenges
  • Skills required for an Ethical Hacker


    Overview of Cyber Law

     
  • Introduction To Cyber Law
  • Cyber Laws Indian
  • Technical Aspect Of Indian Cyber Law
  • IT ACT 2000 & 2008
  • Internet Crimes And Frauds
  • Cyber Law Cases In India
  • Organization Under Cyber Laws
  • Advantages Of Cyber Laws
     

Computer Virtualization technology & LAB setup

  • Introduction To Cyber Law
  • Cyber Laws Indian
  • Technical Aspect Of Indian Cyber Law
  • IT ACT 2000 & 2008
  • Internet Crimes And Frauds
  • Cyber Law Cases In India
  • Organization Under Cyber Laws
  • Advantages Of Cyber Laws


 

  • Concept of virtualization technology

    Need & Advantage Of Virtualization
  • Requirements for virtualization
  • Creating virtual machines and optimization performance
  • Installing OS (Windows and Linux) On Virtual Machines
  • Virtual networking what and why?


  • Information Gathering(Foot printing)

    What Is Information Gathering & Why Hackers Need This?
  • Types Of Information Gathering
  • Information Gathering Using Websites
  • Information Gathering Using Software
  • Search Engines- Smart Way Of Information Gathering
  • Ping
  • Who-is Lookup
  • People Search
  • DNS Lookup
  • Benefits of Footprinting

  • Windows Hacking & Security

    Introduction Windows Security
  • User Accounts Security, Attacks and countermeasure
  • Hacking Into System by Changing Passwords
  • Getting Access to System By Elevating Privileges
  • Finding Out the Passwords Of Windows
  • Bypassing the Windows Security

    Data Recovery


    Steganography & Cryptography

    Desktop exploitation & Data hidding

    Fake Calling and SMS


    Mobile Phone Hacking


     
  • Use of mobile in hacking
  • Hidden funcion of mobile
  • Rooting


    Denial of Service Attack(DOS-Attack)


     
  • What is a Denial of Service Attack?
  • What is Distributed Denial of Service Attacks?
  • DoS Attack Techniques
  • Detail Study on DoS Attack Tools


    Hacking by Viruses, Trojans, Keyloggers & Spywares


     
  • What is viruses?
  • What is Trojan?
  • Trojans/viruses Attack
  • Different way a Trojan Can Get Into A System
  • How Attacker Bypass Your Antivirus By Trojans



Proxy Server & Virtual Private Network (VPN) Technology

Proxy And Types Of Proxies

  • Why Hackers Use Proxy?
  • How To Hide IP Address While Chatting
  • How To Open Block Website In College/Companies
  • Convert Your Machine As Proxy Server With HTTPS Proxy
  • Advantage And Disadvantage Of Proxy
  • How Proxy Hack Your Passwords Etc
  • What Is VPN?
  • Why We Use VPN
  • Advantage & Disadvantage Of VPN
  • Free VPN


Google Hacking and Google Hacking Database

Introduction and Working of Search Engines

List of Common Search Engines on Web

Comparing and Choosing Best Search Engine

Google For Hacking Search Engines

Finding Admin Pages and Weakness In Site

Security against Search Engine Hacking

 

Email/Social Sites Hacking & Security Issues

 

Analysis Email Attacks (Live Demo) Manually & Automatic

Cookies Stealing (Session Hijacking) of All Big Mail Servers

Phishing Attacks ( Normal & Advanced )

Analyzing Fake & Real Profiles & Email Accounts

Fake Mailing Attack

Email & Fake Profile Tracing

Facebook Phishing Attacks

Facebook Account security with Email & SMS Notifications

 

SQL Injection

 

What is SQL Injection..??

SQL Injection Attacks

How Web Applications Work?

SQL Injection Detection

Types of SQL Injection

How to Defend Against SQL Injection Attacks..??

 

Wireless Hacking

 

Wireless Standards

Common Vulnerabilities in Wireless Devices

Encryption Standards Used in Wi-Fi

WEP Cracking

WPA/WPA2 Cracking

WPS Cracking

Solve Security challenges

 

 

Linux Training

 

what is linux & how to operate this OS

use of linux

Wi-Fi cracking & security

Pentesting(Site Cloning)

Network find

Network scanning

DNS Hacking(Server hacking)

What is DNS..??

DNS Attack

FACEBOOK/Any Mail id HACKED!!!

Security

wifi jammer

Armitage

NMAP

Honeyports

terminal function

 

.........And many More hacking ...

Security

Facebook/mail Account Security

Whatsapp Security

Andriod phone Security

 

Cyber Crime Investigation(Case Study)

 

Introduction to Cyber Crime Investigation.

Types of Cyber Crimes.

Report Cyber Crimes.

Investigating Emails (Email Tracing)

Online email header analysis.

Investigating Phishing Cases.

Investigating Data Theft Cases.

Investigating Facebook Profile Impersonation Cases

 

Recommended next Course after this course: -

  • LPT

 

Contact Us: -

Call Us on +91-7023080553 ,  0141-2297567 OR

email us at                                            trainings.capalive@gmail.com / trainings@capalive.com



Contact Us

Disclaimer

By accessing this web site, you are agreeing to be bound by these web site Terms and Conditions of Use, all applicable laws and regulations, and agree that you are responsible for compliance with any applicable local laws. The materials contained in this web site are protected by applicable copyright and trade mark law.

Contact Details

Telephone: +91-7023080553
  +91-9116810553   0141-2297567
Email: info@capalive.com
Website: www.capalive.com