Workshop


  • Ethical Hacking as the name suggests, means hacking into something ethically.
  • Ethical hacking helps you to learn a lot about hacking as well as what precautions to be taken to save yourselves from being hacked.
  • This workshop is designed in such a way that the trainer will use two laptops and one would be working as Victim and one as hacker and he will show real time demos on how to do attacks on the computer of the victim.

Introduction to Ethical Hacking and Networking and Basics 

  • What is Information Security?
  • Problems faced by the Corporate World
  • Why Corporate needs Information Security? Who is a Hacker?
  • Type of Ethical Hackers
  • Classification of Hackers
  • Phases of Hacking
  • IP Address, Finding a Remote IP Address
  • Tracing an IP Address
  • MAC Addresses Spoofing


Scanning

  • Definition of Scanning
  • Types of Scanning
  •   Difference between Port and Network Scanning
  •  Network Scanning
  • Use of NMAP


Footprinting

  • What is Footprinting?
  • Types of Footprinting
  • DNS brute forcing with fierce
  • Domain Information Groper


Wireless Hacking

  • Introduction of Wireless Network
  • Types of Wireless Network ,Wireless Technology
  • Advantages and Disadvantages of Wireless Network
  • Trojan 
  • Virus & Worm


Android Phone Hacking

  • Introduction to Android 
  • Gaining Access to Android Phone 
  • APK File Package, Securing you Mobile

Keylogger

  • What is Keylogger?
  • Categorization of Keystroke Loggers
  • Advanced Keylogger


USB Hacking & Browser Hacking

  • USB Hacking USB for Coping Data
  • Blocking USB Devices
  • Browser Security


Crypotography

  • Introduction to Cryptography
  • Advantages and uses of Cryptography
  • Symmetric Algorithms Asymmetric Algorithms


Stenography

  • Art of Hiding
  • How Steganography Works
  • Steganography Today
  • Steganography With CMD


Social Engineering attacks Through SET - Set Social Engineering toolkit.


SQL Injection Concepts

  • Basics of SQL
  • Web Application Working
  • Introduction to Server Side Technologies
  • SQL injection


Social Engineering

  • What is Social Engineering?
  • Techniques of Social Engineering
  • Attempt Using Phone, E-mail, Traditional Mail, In person, Dumpster Diving, Websites, Shoulder 
  • surfing, Third Person Approach.
  • Spam Emails


Firewalls & Honeypots

  • What Does a Firewall Do?
  • What a Firewall cannot do
  • How does a Firewall work?
  • Types of Firewall
  • Working of Firewall


Penetration Testing

  • Pen Testing Concepts
  • Types of Pen Testing
  • Pen Testing Phases & Tools


Miscellaneous techniques:

  • How to fake call
  • How to fake mail
  • How to trace both of the aforementioned techniques
  • How to enter into any email with self made permutation machines
  • Lateral thinking methods
  • Also there will be Case Studies of various real time hacks!


Trainer will provide all necessary software and installation along with e-books,videos and presentations.