This course will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.
By the end of the course, participants will be able to:
Knowledge of networking and operating systems
Module 1 | |
---|---|
Introduction to Ethical Hacking | |
Module 2 | |
Foot-printing and Reconnaissance | |
Module 3 | |
Scanning Network | |
Module 4 | |
Enumeration | |
Module 5 | |
Vulnerability Analysis | |
Module 6 | |
System Hacking | |
Module 7 | |
Malware Threats | |
Module 8 | |
Sniffing | |
Module 9 | |
Social Engineering | |
Module 10 | |
Denial of service | |
Module 11 | |
Session Hijacking | |
Module 12 | |
Evading IDS Firewalls and Honeypoots | |
Module 13 | |
Hacking Web Servers | |
Module 14 | |
Hacking Web Applications | |
Module 15 | |
SQL Injection | |
Module 16 | |
Hacking Wireless Networks | |
Module 17 | |
Hacking Mobile Platforms | |
Module 18 | |
IoT and OT Hacking | |
Module 19 | |
Cloud Computing | |
Module 20 | |
Cryptography | |
Responsibilities of Corvit | Duration | Starting Date | |
---|---|---|---|
• Provision of trainer • Provision of training material in soft form • Provision of training certificates |
40 Hours |
26th Sep 6.00 PM till 9.00 PM Mondays & Thursdays |