The Course is designed to make you learn the professional way of ethical hacking by best in the industry. In this Ethical Hacking Course we will train you on the advanced step-by-step methodologies that hackers actually use, such as writing virus codes, penetration testing, system exploitations & security, web exploitations and reverse engineering, so you can better protect corporate infrastructure from data breaches. You’ll master advanced network packet analysis, securing web servers, malware threats, and advanced system penetration testing techniques to build your network security skillset and beat hackers at their own game.
What This Course Includes
The course is divided into 22 modules for a duration of 60 hours, where you will be trained by the established experts in the industry.
Module 01 - Introduction to ethical hacking
In this module, you will learn about the basics of ethical hacking, from what it is to how it's used in the real world to support business systems. Students will learn about administrative controls, technical controls, and physical controls. This module will also cover the confidentiality, integrity, and availability of data.
Module 02 - foot-printing and reconnaissance
In this module, Reconnaissance, students will learn about data reconnaissance, the first step in the hacking life cycle. This module will cover what information hackers gather and several of the means by which they gather information. Students will learn about passive vs active reconnaissance, the difference between whether the hacker has any direct interaction with the target or not.
Module 03 - Scanning networks
“Knowing your enemy is winning half the war..”
Similarly, when you know about your target, half the task of Hacking is done. There are different ways to gather information about your target. We will be teaching you how ethical hackers gather specific details of their target using Network Scanning for Ethical Hacking.
Module 04 - Enumeration
Enumeration belongs to the first phase of Ethical Hacking, i.e., “Information Gathering”. This is a process where the attacker establishes an active connection with the victim and try to discover as much attack vectors as possible, which can be used to exploit the systems further.
Module 05 - Vulnerability Analysis
Certified ethical hackers perform a vulnerability analysis using various tools and scanners to discover grey areas and risks in a system. The key types of vulnerabilities in cybersecurity are: Human Vulnerabilities: Lack of information can disrupt systems or networks and provide access to malicious actors.
Module 06 - System Hacking
System hacking is the way ethical hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks.
Module 07 - Malware Threats
Malware is malicious software which when enters the target host, gives an attacker full or limited control over the target. They can either damage or modify the functionalities of target host helping an attacker to steal or destroy information.
Various types of malware:
Module 08 - Sniffing
Sniffing is the process of monitoring and capturing all data packets that are passing through a computer network using packet sniffers. Packet Sniffers are used by network administrators to keep track of data traffic passing through their network. These are called network protocol analyzers. In the same way, malicious attackers employ the use of these packet sniffing tools to capture data packets in a network. Data packets captured from a network are used to extract and steal sensitive information such as passwords, usernames, credit card information, etc. Attackers install these sniffers in the system in the form of software or hardware. There are different types of sniffing tools used and they include Wireshark, Ettercap, BetterCAP, Tcpdump, WinDump, etc.
Module 09- Social Engineering
Social engineering is the art of manipulating users of a computing system into revealing confidential information that can be used to gain unauthorized access to a computer system. The term can also include activities such as exploiting human kindness, greed, and curiosity to gain access to restricted access buildings or getting the users to installing backdoor software.Knowing the tricks used by hackers to trick users into releasing vital login information among others is fundamental in protecting computer systemsIn this tutorial, we will introduce you to the common social engineering techniques and how you can come up with security measures to counter them.
Module 10- Denial of service
A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash. In both instances, the DoS attack deprives legitimate users (i.e. employees, members, or account holders) of the service or resource they expected.Victims of DoS attacks often target web servers of high-profile organizations such as banking, commerce, and media companies, or government and trade organizations. Though DoS attacks do not typically result in the theft or loss of significant information or other assets, they can cost the victim a great deal of time and money to handle.
Module 11- Session Hijacking & Click Hijacking
Session hijacking is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out. The attack relies on the attacker’s knowledge of your session cookie, so it is also called cookie hijacking or cookie side-jacking. Although any computer session could be hijacked, session hijacking most commonly applies to browser sessions and web applications.
Module 12 - Evading IDs, Firewalls and Honeypots
An Intrusion Detection System (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system.
Evading IDS, Firewalls and Honeypots contains the following Exercises:
Module 13- Hacking web services
The vulnerabilities in the web service protocols like SOAP, WSDL, UDDI can be exploited to do various kinds of attacks like SQL injection, XML poisoning, etc.
Module 14- Hacking web applications
Web application provides an interface between the web server and the client to communicate. Web pages are generated at the server, and browsers present them at the client side. The data is passed between client and server in the form of HTML pages through HTTP protocol.There are client-side vulnerabilities and server-side vulnerabilities which lead to a web application attack.
Module 15- SQL Injection
SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior.In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack.
Module 16- Hacking wireless networks
Cracking a wireless network is defeating the security of a wireless local-area network (back-jack wireless LAN). A commonly used wireless LAN is a Wi-Fi network. Wireless LANs have inherent security weaknesses from which wired networks are exempt.Wireless cracking is an information network attack similar to a direct intrusion. Two frequent types of vulnerabilities in wireless LANs are those caused by poor configuration, and those caused by weak or flawed security protocols.
Module 17- Reverse engineering
With the help of Reverse Engineering we can modify a software at own way… Like we can change the name of Software, We can editing a software, We can convert Trial Software to License software… n many more.Reverse-engineering can also expose security flaws and questionable privacy practice.So Reverse Engineering is a hacker friendly tool…. Use it n Enjoy..!!
Module 18- STEGANOGRAPHY
Steganography is the process of hiding data in other types of data such as images or text files. ... Attackers can embed any information in a graphic file using steganography. The hacker can hide directions on making a bomb, a secret bank account number, or answers to a test. Any text imaginable can be hidden in an image.
Module 19- CRYPTOGRAPHY
It works by converting plain text into cipher text using some encryption algorithm at the sender's side and converting ciphertext into plain text at the receiver's. Cryptography is used to provide confidentiality, integrity, authenticity and non-repudiation.
Module 20- Hacking mobile platforms
The mobile device has become an inseparable part of life today. The attackers are easily able to compromise the mobile network because of various vulnerabilities, the majority of the attacks are because of the untrusted apps. SMS is another way the attackers are gaining access to the mobile devices by sending phishing messages/spam messages to users. The main operating systems used are:
Module 21- SIM Cloning
Well There are many things to do when you clone a SIM Card, You can secretly spy on the victims calls and data transfers, make him mobile bill go crazy, send messages and make calls from his number by using sim cloning, All without touching the victims Cell Phone.
Module 22- Convert a pendrive into an Ethical hacking device
I am taking about a pendrive which can hack your system and steal your passwords just by injecting it. It is also know as “USB Password stealer”
Lesson 01 - Information Security Overview
Lesson 02 - Information Security Threats and Attack Vectors
Lesson 03 - Penetration Testing Concepts
Lesson 04 - Hacking Concepts
Lesson 05 - Ethical Hacking Concepts
Lesson 06 - Information Security Controls
Lesson 07 - Information Security Laws and Standards
Lesson 08 - Footprinting Concepts
Lesson 09 - Footprinting through Search Engines
Lesson 10 - Footprinting through Web Services
Lesson 11 - Footprinting through Social Networking Sites
Lesson 12 - Website Footprinting
Lesson 13 - Email Footprinting
Lesson 14 - Competitive Intelligence
Lesson 15 - Whois Footprinting
Lesson 16 - DNS Footprinting
Lesson 17- Network Footprinting
Lesson 18- Footprinting through Social Engineering
Lesson 19 - Footprinting Tools
Lesson 20 - Countermeasures
Lesson 21 - Footprinting Pen Testing
Lesson 22 - Scanning Networks
Lesson 23 - Network Scanning Concepts
Lesson 24 - Scanning Tools
Lesson 25 - Scanning Techniques
Lesson 26 - Scanning Beyond IDS and Firewall
Lesson 27 - Banner Grabbing
Lesson 28 - Draw Network Diagrams
Lesson 29 - Scanning Pen Testing
Lesson 30 - Enumeration
Lesson 31 - Enumeration Concepts
Lesson 32 - NetBIOS Enumeration
Lesson 33 - SNMP Enumeration
Lesson 34 - LDAP Enumeration
Lesson 35 - NTP Enumeration
Lesson 36 - SMTP Enumeration and DNS Enumeration
Lesson 37 - Enumeration Countermeasures
Lesson 38 - Other Enumeration Techniques
Lesson 39 - Enumeration Pen Testing
Lesson 40 - Vulnerability Analysis
Lesson 41 - Vulnerability Assessment Concepts
Lesson 42 - Vulnerability Assessment Solutions
Lesson 43 - Vulnerability Scoring Systems
Lesson 44 - Vulnerability Assessment Tools
Lesson 45 - Vulnerability Assessment Reports
Lesson 46 - System Hacking
Lesson 47 - System Hacking Concepts
Lesson 48 - Cracking Passwords
Lesson 49 - Escalating Privileges
Lesson 50 - Executing Applications
Lesson 51 - Hiding Files
Lesson 52 - Covering Tracks
Lesson 53 - Penetration Testing
Lesson 54 - Malware Threats
Lesson 55 - Malware Concepts
Lesson 56 - Trojan Concepts
Lesson 57 - Virus and Worm Concepts
Lesson 58 - Malware Analysis
Lesson 59 - Countermeasures
Lesson 60 - Anti-Malware Software
Lesson 61 - Malware Penetration Testing
Lesson 62 - Sniffing
Lesson 63 - Sniffing Concepts
Lesson 64 - Sniffing Technique: MAC Attacks
Lesson 65 - Sniffing Technique: DHCP Attacks
Lesson 66 - Sniffing Technique: ARP Poisoning
Lesson 67 - Sniffing Technique: Spoofing Attacks
Lesson 68 - Sniffing Technique: DNS Poisoning
Lesson 69 - Sniffing Tools
Lesson 70 - Countermeasures
Lesson 71 - Sniffing Detection Techniques
Lesson 72 - Sniffing Pen Testing
Lesson 73 - Social Engineering
Lesson 74 - Social Engineering Concepts
Lesson 75 - Social Engineering Techniques
Lesson 76 - Insider Threats
Lesson 77 - Impersonation on Social Networking Sites
Lesson 78 - Identity Theft
Lesson 79 - Countermeasures
Lesson 80 - Social Engineering Penetration Testing
Lesson 81 - Denial-of-Service
Lesson 81 - DoS/DDoS Concepts
Lesson 82 - DoS/DDoS Attack Techniques
Lesson 83 - Botnets
Lesson 84 - DDoS Case Study
Lesson 85 - DoS/DDoS Attack Tools
Lesson 86 - Countermeasures
Lesson 87 - DoS/DDoS Protection Tools
Lesson 88 - DoS/DDoS Attack Penetration Testing
Lesson 89 - Session Hijacking
Lesson 90 - Session Hijacking Concepts
Lesson 91 - Application Level Session Hijacking
Lesson 92 - Network Level Session Hijacking
Lesson 93 - Session Hijacking Tools
Lesson 94 - Countermeasures
Lesson 95 - Penetration Testing
Lesson 96 - Evading IDS, Firewalls, and Honeypots
Lesson 97 - IDS, Firewall, and Honeypot Concepts
Lesson 98 - IDS, Firewall, and Honeypot Solutions
Lesson 99 - Evading IDS
Lesson 100 - Evading Firewalls
Lesson 101 - IDS/Firewall Evading Tools
Lesson 102 - Detecting Honeypots
Lesson 103 - IDS/Firewall Evasion Countermeasures
Lesson 104 - Penetration Testing
Lesson 105 - Hacking Web Servers
Lesson 106 - Web Server Concepts
Lesson 107 - Web Server Attacks
Lesson 108 - Web Server Attack Methodology
Lesson 109 - Web Server Attack Tools
Lesson 110 - Countermeasures
Lesson 111 - Patch Management
Lesson 112 - Web Server Security Tools
Lesson 113 - Web Server Pen Testing
Lesson 114- Hacking Web Applications
Lesson 115 - Web App Concepts
Lesson 116 - Web App Threats
Lesson 117 - Hacking Methodology
Lesson 118 - Web Application Hacking Tools
Lesson 119 - Countermeasures
Lesson 120 - Web App Security Testing Tools
Lesson 121 - Web App Pen Testing
Lesson 122 - SQL Injection
Lesson 123 - SQL Injection Concepts
Lesson 124 - Types of SQL Injection
Lesson 125 - SQL Injection Methodology
Lesson 126 - SQL Injection Tools
Lesson 127 - Evasion Techniques
Lesson 128 - Countermeasures
Module 129 - Hacking Wireless Networks
Lesson 130 - Wireless Concepts
Lesson 131 - Wireless Encryption
Lesson 132 - Wireless Threats
Lesson 133 - Wireless Hacking Methodology
Lesson 134 - Wireless Hacking Tools
Lesson 135 - Bluetooth Hacking
Lesson 136 - Countermeasures
Lesson 137 - Wireless Security Tools
Lesson 138 - Wi-Fi Pen Testing
Lesson 139 - Reverse Engineering
Lesson 140 - How to crack or bypass paid applications
Lesson 141 - Steganography
Lesson 142 - Steganography Concepts
Lesson 143 - Algorithm
Lesson 144 - Steganography Tools
Lesson 145 - How to hide message in photo
Lesson 146 - Countermeasures
Lesson 147 - Cryptography
Lesson 148 - Cryptography Concepts
Lesson 149 - Encryption Algorithms
Lesson 150 - Cryptography Tools
Lesson 151 - Public Key Infrastructure (PKI)
Lesson 152 - Email Encryption
Lesson 153 - Disk Encryption
Lesson 154 - Cryptanalysis
Lesson 155 - Countermeasures
Lesson 156 - Hacking Mobile Platforms
Lesson 157 - Mobile Platform Attack Vectors
Lesson 158 - Hacking Android OS
Lesson 159 - Hacking iOS
Lesson 160 - Mobile Spyware
Lesson 161 - Mobile Device Management
Lesson 162 - Mobile Security Guidelines and Tools
Lesson 163 - Mobile Pen Testing
Lesson 164 - Sim cloning
Lesson 165 - Convert a pendrive into an Ethical Hacking Device
Six months free access to CEH v11 course.
6 Weeks Intense Live Classes.
Classes in Flexible Timings after working hours.
Even if you miss a class you will get the recording.
You can repeat the course up-to 6 months.
Access to Premium Paid Ethical Hacking and Data Recovery Tools(lifetime access).
6 Months LIVE Support.
Very active Discussion forum for SMTI's Ethical Hacking Course Members.
Suitable foe all those Who are students or working professionals.
EMI OPTIONS AVAILABLE THROUGH ALL MAJOR CREDIT CARDS.
Network security officers & practitioners.
IS/IT specialist, analyst, or manager.
IT operations manager.
IT security officer, auditor, or engineer.
Technical support engineer.
Systems analyst or administrator.
"Live Webinars helped me to shine a light into the dark corners of my knowledge gaps. I can now develop apps more confidently with the new knowledge I gained here."
" This Webinars offers in person training with ample online support and continuing educational tools. The instructors are very seasoned with a lot of depth of knowledge and experience. "