This course will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.
By the end of the course, participants will be able to:
Knowledge of networking and operating systems
| Module 1 | |
|---|---|
| Introduction to Ethical Hacking | |
| Module 2 | |
| Foot-printing and Reconnaissance | |
| Module 3 | |
| Scanning Network | |
| Module 4 | |
| Enumeration | |
| Module 5 | |
| Vulnerability Analysis | |
| Module 6 | |
| System Hacking | |
| Module 7 | |
| Malware Threats | |
| Module 8 | |
| Sniffing | |
| Module 9 | |
| Social Engineering | |
| Module 10 | |
| Denial of service | |
| Module 11 | |
| Session Hijacking | |
| Module 12 | |
| Evading IDS Firewalls and Honeypoots | |
| Module 13 | |
| Hacking Web Servers | |
| Module 14 | |
| Hacking Web Applications | |
| Module 15 | |
| SQL Injection | |
| Module 16 | |
| Hacking Wireless Networks | |
| Module 17 | |
| Hacking Mobile Platforms | |
| Module 18 | |
| IoT and OT Hacking | |
| Module 19 | |
| Cloud Computing | |
| Module 20 | |
| Cryptography | |
| Responsibilities of Corvit | Duration | Starting Date | |
|---|---|---|---|
|
• Provision of trainer • Provision of training material in soft form • Provision of training certificates |
40 Hours |
26th Sep 6.00 PM till 9.00 PM Mondays & Thursdays |