Join Web Development Institute to learn Ethical Hacking Course in Rohini Delhi.
1. Introduction to Ethical Hacking
- What is Ethical Hacking?
- Cybersecurity Threats and Attack Vectors
- Information Security Controls
- Hacking Concepts (Hacker Types, Hacking Phases)
- Legal Implications and Professional Ethics
2. Footprinting and Reconnaissance
- Information Gathering Techniques
- Types of Footprinting (Active, Passive)
- Footprinting Tools
- WHOIS Lookup, DNS Interrogation, IP Geolocation
- Social Engineering Techniques
- Countermeasures for Footprinting
3. Scanning Networks
- Network Scanning Methodologies
- Port Scanning (TCP, UDP)
- Vulnerability Scanning
- Scanning Tools: Nmap, SuperScan, etc.
- Banner Grabbing and OS Fingerprinting
- Countermeasures for Network Scanning
4. Enumeration
- Enumeration Concepts and Techniques
- Network Enumeration Tools
- NetBIOS Enumeration, SNMP Enumeration
- Countermeasures for Enumeration
5. Vulnerability Analysis
- Vulnerability Assessment Life Cycle
- Vulnerability Classification (CVSS, CVE)
- Vulnerability Scanning Tools (OpenVAS, Nessus)
- Manual Vulnerability Discovery Techniques
- Patch Management and Security Updates
6. System Hacking
- Password Cracking Techniques (Brute Force, Dictionary Attack, Rainbow Tables)
- Privilege Escalation (Windows and Linux)
- Steganography and Covering Tracks
- Malware Types: Trojans, Backdoors, Ransomware, Rootkits
- Remote Access Trojans (RATs)
- Countermeasures for System Hacking
7. Malware Threats
- Types of Malware (Viruses, Worms, Spyware, Adware)
- Malware Detection and Analysis Techniques
- Trojans, Keyloggers, and Botnets
- APTs (Advanced Persistent Threats)
- Anti-Malware Tools and Best Practices
8. Sniffing
- Network Sniffing Concepts (Active vs Passive Sniffing)
- Packet Capture Tools (Wireshark, tcpdump)
- ARP Poisoning, MAC Flooding, DNS Poisoning
- MITM (Man-in-the-Middle) Attacks
- Countermeasures to Defend Against Sniffing
9. Social Engineering
- Social Engineering Techniques (Phishing, Spear Phishing, Pretexting, Baiting)
- Human-based and Computer-based Social Engineering Attacks
- Impersonation, Insider Threats
- Social Engineering Penetration Testing
- Countermeasures: Security Awareness and Training
10. Denial-of-Service (DoS) Attacks
- DoS vs DDoS Attacks
- DoS Techniques (Flood Attacks, Ping of Death, SYN Flood)
- Botnets and DDoS Tools
- Application Layer DoS Attacks
- DoS Detection and Mitigation Techniques
11. Session Hijacking
- Session Hijacking Concepts
- Types of Session Hijacking (TCP/IP Hijacking, MITM Attacks)
- Session Fixation and Session Replay Attacks
- Tools and Techniques for Session Hijacking
- Countermeasures for Session Hijacking
12. Evading IDS, Firewalls, and Honeypots
- IDS, IPS, and Firewall Evasion Techniques
- Fragmentation Attacks, Tunneling, Obfuscation
- Detection Evasion Tools (Nikto, Firewalk)
- Honeypots and Honeynets
- Firewall and IDS/IPS Best Practices
13. Hacking Web Servers
- Web Server Attacks (Directory Traversal, Web Shells)
- Exploiting Web Server Vulnerabilities
- Misconfiguration Exploits and Zero-Day Attacks
- Tools: Metasploit, Nikto, and others
- Countermeasures for Web Server Attacks
14. Hacking Web Applications
- Web Application Attacks (SQL Injection, XSS, CSRF)
- Exploiting Authentication and Authorization Flaws
- Session Management Attacks
- Web Application Security Tools: Burp Suite, OWASP ZAP
- Web Application Security Best Practices (OWASP Top 10)
15. SQL Injection
- Introduction to SQL Injection Attacks
- Types: In-Band, Blind, Out-of-Band SQL Injection
- Exploiting SQL Injection for Data Exfiltration
- SQL Injection Tools: sqlmap, Havij
- SQL Injection Countermeasures (Input Validation, Prepared Statements)
16. Hacking Wireless Networks
- Wireless Network Encryption: WEP, WPA, WPA2
- Wireless Hacking Techniques (Cracking WEP/WPA2, Evil Twin Attacks)
- Wireless Sniffing and Man-in-the-Middle Attacks
- Wireless Hacking Tools: Aircrack-ng, WiFite
- Wireless Security Best Practices
17. Hacking Mobile Platforms
- Mobile Operating Systems (iOS, Android)
- Mobile Platform Attack Vectors
- Mobile Malware, SMS Phishing, App Exploits
- Mobile Device Management (MDM) Security
- Mobile Device Security Best Practices
18. IoT Hacking
- Introduction to IoT (Internet of Things) and IIoT
- IoT Threats and Vulnerabilities
- IoT Device Hacking Techniques
- IoT Security Tools
- Securing IoT Networks and Devices
19. Cloud Computing
- Cloud Computing Concepts
- Cloud Security Issues and Challenges
- Cloud Computing Threats (Data Breaches, Insecure APIs)
- Cloud Service Models: SaaS, PaaS, IaaS
- Cloud Security Best Practices
20. Cryptography
- Cryptography Concepts (Symmetric and Asymmetric Encryption)
- Public Key Infrastructure (PKI)
- Hashing Algorithms (SHA, MD5)
- Digital Signatures and Certificates
- Cryptanalysis Techniques and Tools
- Cryptography Best Practices
21. Penetration Testing Framework
- Introduction to Penetration Testing
- Phases of Penetration Testing (Planning, Reconnaissance, Scanning, Exploitation, Reporting)
- Penetration Testing Tools and Techniques
- Writing Penetration Testing Reports
- Penetration Testing Best Practices
22. Ethical Hacking Tools
- Kali Linux and its Toolsets
- Metasploit Framework
- Nmap, Wireshark, John the Ripper, Hydra, Nikto, Burp Suite
- Scripting for Automation (Python, Bash)
- Ethical Hacking Lab Setup