Introduction to Program

This course will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

Course Objectives

By the end of the course, participants will be able to:

  • The step-by-step process and tactics utilized by hackers to penetrate systems
  • Trojans, backdoors, and countermeasures to stop attacks
  • IDS, firewalls, wireless hacking, and more
  • Advanced hacking concepts, smartphone hacking, writing virus codes, corporate espionage, and reverse engineering
  • Powershell, Oracle databases, hacking SQL, Apache Web servers, and more
  • Network, mobile application security, and assess threats and vulnerabilities
  • Information assurance and managing information security

Course Prerequisites

Knowledge of networking and operating systems

Course Outline

Module 1 
Introduction to Ethical Hacking 

Module 2 
Foot-printing and Reconnaissance 

Module 3 
Scanning Network 

Module 4 

Module 5 
Vulnerability Analysis 

Module 6 
System Hacking 

Module 7 
Malware Threats 

Module 8 

Module 9 
Social Engineering 

Module 10 
Denial of service 

Module 11 
Session Hijacking 

Module 12 
Evading IDS Firewalls and Honeypoots 

Module 13 
Hacking Web Servers 

Module 14 
Hacking Web Applications 

Module 15 
SQL Injection 

Module 16 
Hacking Wireless Networks 

Module 17 
Hacking Mobile Platforms 

Module 18 
IoT and OT Hacking 

Module 19 
Cloud Computing 

Module 20 

Course Details

Responsibilities of Corvit Duration Starting Date  
• Provision of trainer
• Provision of training material in soft form
• Provision of training certificates
40 Hours 26th Sep
6.00 PM till 9.00 PM
Mondays & Thursdays