Ethical Hacking

Ethical Hacking, also known as penetration testing, intrusion testing, or red teaming, is the controversial act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers.

An Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. Nowadays, certiļ¬ed ethical hackers are among the most sought after information security employees in large organizations such as Wipro, Infosys, IBM, Airtel and Reliance among others

Course Details

  1. Introduction to Ethical Hacking

  2. Footprinting and Reconnaissance

  3. Scanning Networks

  4. Enumeration

  5. System Hacking

  6. Malware Threats

  7. Evading IDS, Firewalls and Honeypots

  8. Sniffing

  9. Social Engineering

  10. Denial of Service

  11. Session Hijacking

  12. Hacking Web servers

  13. Hacking Web Applications

  14. SQL Injection

  15. Hacking Wireless Networks

  16. Hacking Mobile Platforms

  17. Cloud Computing

  18. Cryptography