• No products in the cart.

  • LOGIN

Course Curriculum

Module 1 : Introduction to Ethical Hacking and Cyber Security
Introduction to hacking 00:00:00
Introduction to cyber security 00:00:00
Goals and Boundaries 00:00:00
Phases of Hacking 00:00:00
Approaches of an Hacker 00:00:00
Module 2 : Network Fundamentals
Basics of Networks 00:00:00
Introduction to IP address, MAC address, Web server 00:00:00
Changing IP address with Tor 00:00:00
Changing IP address with VPN 00:00:00
Changing IP address with Proxy Server 00:00:00
Changing MAC address 00:00:00
Working of Web Servers 00:00:00
Brief idea about DNS leaks 00:00:00
Being completely Anonymous 00:00:00
Module 3 : Information Gathering
Introduction to Information gathering 00:00:00
Information gathering approach 00:00:00
Types of Information gathering 00:00:00
WHOIS Lookup 00:00:00
Introduction to Google Dorks 00:00:00
Introduction to robots.txt 00:00:00
Information gathering using Wayback Machine 00:00:00
Information gathering using Netcraft 00:00:00
Information gathering using Wappalyzer 00:00:00
Information gathering using Maltego 00:00:00
Information gathering using Metagoofil 00:00:00
Approaches to find email address 00:00:00
Compiling and Analysis of the Information gathered 00:00:00
Module 4 : Scanning and Enumeration
Introduction to scanning approaches 00:00:00
Types of scanning and TCP connection flags 00:00:00
Checking for systems power 00:00:00
Port scanning using Nmap 00:00:00
Port scanning using netdiscover 00:00:00
Port scanning using Angry IP Scanner 00:00:00
Nmap Port or service scanning 00:00:00
Operating System scan using Nmap 00:00:00
Aggressive and advanced scan using Nmap 00:00:00
IP scanning using Nmap 00:00:00
Module 5 : Vulnerability Assesment
Introduction to Vulnerability scanner 00:00:00
Types of Vulnerabilities 00:00:00
Vulnerability Assessment using Nmap 00:00:00
Vulnerability Assessment using Nessus 00:00:00
Vulnerability Assessment using OpenVAS 00:00:00
Module 6 : Operating System Penetration Testing
Introduction to OS 00:00:00
Introduction to Metasploit Framework 00:00:00
Introduction to Exploit, Payload, Post, Auxiliary and nops 00:00:00
Finding exploits using searchsploit 00:00:00
Exploitation of Windows XP 00:00:00
Privilege escalation exploit code for Windows 7 00:00:00
Mozilla Firefox Universal exploit 00:00:00
Exploitation of Windows 8 00:00:00
Exploitation of Windows 10 00:00:00
Module 7 : Malware, Viruses and Trojans
Introduction to Viruses, Malware and Trojan 00:00:00
Types of Viruses 00:00:00
Creation of custom Malware, Virus and Trojan with automated tool 00:00:00
Protection from Virus, Malware and Trojan 00:00:00
Module 8 : Social Engineering
Introduction to social engineering 00:00:00
Types of social engineering attacks 00:00:00
Creating phishing page and methodology 00:00:00
Protection from social engineering attacks 00:00:00
Module 9 : Mobile Vulnerability Exposure and Exploitation
Introduction to android and iOS 00:00:00
Security flaws of android and iOS 00:00:00
Gaining complete access of the system using msfvenom 00:00:00
Call Spoofing 00:00:00
SMS Spoofing 00:00:00
Module 10 : Wireless penetration Testing
Working of WIFI 00:00:00
Types of WIFI security 00:00:00
Hacking WEP using wifite or thereaver 00:00:00
Hacking wpa/wpa2 using aircrack-ng 00:00:00
Wireless Technology standards, Interference, Encryption 00:00:00
Module 11 : Web Application Penetration Testing
Introduction to Web Application 00:00:00
Types of wen servers 00:00:00
Types of Attacks 00:00:00
Introduction to Cross-site scripting 00:00:00
Understanding OWASP TOP 10 00:00:00
Web Application Vulnerability Assessment using Vega 00:00:00
Web App Vulnerability Assessment using OWASP ZAP 00:00:00
Web App Firewall Detection using wafw00f 00:00:00
Web App penetration using Burp Suite 00:00:00
Types of Cross-site scripting 00:00:00
Local file inclusion vulnerability 00:00:00
Exploiting vulnerabilities in DVWA 00:00:00
Module 12 : Database Penetration Testing
Introduction to Database 00:00:00
SQL database 00:00:00
SQL queries 00:00:00
Types and Purpose 00:00:00
Introduction to SQL injection 00:00:00
SQL injection using SQLmap 00:00:00
Finding SQLinjectable website 00:00:00
Live demonstration of SQLinjection 00:00:00
Playsafe with SQLinjection 00:00:00
Module 13 : Denial-of-service
Introduction to DoS and DDoS Attacks 00:00:00
DoS and DDoS Attack Techniques 00:00:00
How to secure from the attack 00:00:00
Module 14 : Applied Cryptography
Introduction to Cryptography 00:00:00
Types of Cryptography 00:00:00
Symmetric Key Cryptography 00:00:00
Asymmetric Key Cryptography 00:00:00
Module 15 : Cryptocurrency
Introduction and Types of Cryptocurrency 00:00:00
Introduction to Blockchain 00:00:00
Bitcoin 00:00:00
Module 16 : Fundamentals of Ransomeware
Introduction to Ransomeware 00:00:00
Analysis of Ransomeware 00:00:00
Countermeasures 00:00:00
Module 17 : Dark Web
Introduction to surface web, deep web,and dark web 00:00:00
Features of Deep Web 00:00:00
Legality in Deep Web 00:00:00
Details of Dark Web 00:00:00
Legality in Dark Web 00:00:00
Deep web vs. dark web 00:00:00
Module 18 : Indian IT Act
Details of the Act 00:00:00
Importance of Cyber Law 00:00:00
Module 19 : Bug Bounty
Introduction to Bug Bounty 00:00:00
Scope,Target and Out of Scope 00:00:00
Disclosure Terms & Rules and Reward 00:00:00
Module 20 : Closure Report
Professional report 00:00:00
Writing Format 00:00:00
Do’s and Don’ts 00:00:00
Texial is a Global Leader in Information Security & Forensics