Course Outline
This course delves into the minds of criminal hackers to give students a sense of how black hat hackers think, what their intentions are, and what they do to implement their intentions. Students will learn how to execute and defend against social engineering attacks, network attacks, application attacks, and cryptographic attacks.
Upcoming Meetings
There are no upcoming meetings for this course. Contact us to schedule this course, which will be customized specifically for your organization.
info@hackerupro.comModules
Introsuction to Ethical Hacking
- Fundamentals
- Ethics
- Malware
- Cyber Attack Cycle
Network Scanning
- Network Scanning Definition
- Nmap Overview
- Nmap Scanning Types
- Additional Tools
MITM Attacks
- MITM
- ARP Poisoning
- DNS Poisoning
- Port Stealing
- SSL Stripping
Brute-Force
- Fundamentals
- Offline Password Cracking
- Online Password Attacks
Social Engineering
- Introduction
- Social Engineering Toolkit
- SE Additional Tools
Infrastructure Attacks
- Metasploit
- Reverse Shell
- Lateral Movement
Windows Privilege Escalation
- Windows Privileges
- Windows Local PE
- Post Exploitation
Linux Privilege Escalation
- Linux Local PE
- Linux Remote PE
Web Application Security Fundamentals
- Understanding HTTP
- Burp Suite
XSS & File Inclusion
- Client-Side Web languages
- Cross-Site Scripting
- Session Hijacking
- XSS Mitigations
- Local File Inclusion
SQL Injection
- Introduction to Databases
- SQLi
Vulnerability Scanners & Reporting
- Automated Scanning
- Vulnerability Scanners
- PT Report Subjects
- Regulations
Final Project
- Final Project Scenarios
Prerequisites
- Background in security or information systems
- Knowledge of TCP/IP and experience with networking
- Knowledge of operating systems (Linux and Windows)
Upcoming Meetings
There are no upcoming meetings for this course. Contact us to schedule this course customized for your organization in a group format.
info@hackerupro.comExecute and defend against social engineering attacks, network attacks, application attacks, and cryptographic attacks”Download Full Syllabus