Ethical hacking is for those people who want to make their carrier in Cyber Security or ethical hacking field.During this training , students will be able to identify vulnerabilities in a system and will be able to fix them as well as they will learn how to exploit into the target system by taking the advantage of vulnerabilities. In simple words a hacker dives into a business or organization's computer systems and infrastructure, identifies the security issues and working on them for the proper functioning of the company.
In this ethical hacking program by GRRAS, you will be learning the basics of networking along with different operating systems OS and their multiple features, especially Windows and Linux. With the aid of tools of Kali Linux, web applications, and social media, you will learn to find information about people. The path to entering system is learned, which is an important aspect of scanning target or network. You will also learn to enter the system via creating backdoors, which will give you a distinct edge of benefit. Penetration testing systems, software, mobile platforms, password cracking, network, application, and web application are some of the topics covered. Summarizing, you will learn how to fix vulnerabilities, secure systems, set up firewalls and IPS, IDS.
| Tracks | Regular Track | Full day (Fastrack ) |
|---|---|---|
| Training Duration | 60 hours | 60 hours |
| Training Days | 30 days | 7 days |
What is information security?
Cyber security vs ethical hacking
Type of hackers
Type of attacks
Scope in ethical hacking
Information gathering
Tools: Nmap, Zen MAP, Whois lookup, Nslookup, Harvester, Recon-ng, Kali Linux
Foot printing concepts
Footprinting through search engines
Footprinting through web services
Footprinting though web services
Website Footprinting
Email Footprinting
Whois Footprinting
DNS Footprinting
Footprinting tools
Network scanning concepts
Scanning tools
Host discovery
Port and service discovery
OS discovery (Banner grabbing/OS Footprinting)
Scanning beyond IDS and firewall
Network scanning counter measure
Enumeration concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP and NFS Enumeration
SMTP and DNS Enumeration
Enumeration countermeasures
Tools:Nikto, Metasploit, Burp
Vulnerability assessment concepts
Vulnerability classification and assessment types
Vulnerability assessment tools
Gaining access
Escalating privileges
Maintaining access
Clearing logs
Metasploit
Payload and exploits
Malware concepts
Trojan
Virus and Worms
Fileless malware
Malware analysis
Key loggers
Ransomware
Malware countermeasure
Tools:Virus, Worms, Ransomware, Crypto Malware, Trojans, Rats, Keyloggers, Adware, Spyware, Bots and Botnets
What is OS (Operating system)
Working of OS
Type of OS
Virtualization
VMware & Virtual box
Setup virtualization
Command line interface
Ping
Commands of CMD
Kali Linux
Tools: Intro-VMware, Intro-VirtualBox, Kali-Linux, Parrot OS, Tail
VAPT
Basics of HTML, CSS and JavaScript
Xampp and server management
PHP
Database
OWASP top 10
Phishing
XSS
CSRF
LFI, RFI
SQL injection
Remote code execution
Other imp attacks
Tools:Burp Suite, Types of Editions, Setting Up Proxy, Installing Certificate, Interception, Repeater, Intruder.
What is burpsuite?
Burpsuite setup and installation
Scanning and attacks with burpsuite
Intruder
Repeater
Extensions
Proxy
Editions
Dos attack
Type of dos attack
botnets
How to perform DOS and DDOS
Ping request
social engineering concepts
social engineering techniques
insider threats
impersonating on social networking sites
identity theft
SET Tools
social engineering countermeasure
Tools:SET (Social Engineering Toolkit), Beef (Browser Exploitation Framework), Maltego
Session hacking concepts
Application-level Session hacking
Network-level Session hacking
Session hacking tools
Session hacking countermeasure
IDS, IPS, firewall and honeypots concepts
Evading IDS
Evading firewall
Evading NAC and endpoint security
IDS/firewall evading tools.
Detecting honeypots
IDS/firewall evasion counter
Web server concepts
Web server attack
Web server attack methodology
Web server attacks countermeasure
Web application concepts
Web application threats
Web application hacking methodology
Web API, webhooks and web shell
Web application security
SQL injection concepts
Types of SQL injection
SQL injection methodology
Evasion techniques
Wireless concepts
Wireless encryption
Wireless threats
Wireless hacking methodology
Wireless hacking tools
Wireless attack countermeasure
MAC attacks
DHCP attacks
ARP poisoning
DNS spoofing and sniffing.
Wi-Fi hacking
Tools:Air crack-ng, Wireshark
Internet of things (IOT)
IOT attack
IOT hacking methodology.
IOT attack counter measure
OT Concept
OT attack
OT hacking methodology
OT attack countermeasure
Tools:Arduino, Raspberry Pie, AWS Security
Cryptography concepts
Cryptography algorithms
Cryptography tools
PKI
Email encryption
DISK encryption
Cryptography attack countermeasure
Keylogger
IP Detector
Telnet brute forcer
Sub Domain Scanner
Training Certificate & Internship Letter
Experienced Mentor(5+Years)
Classes Available in Both Modes (online/offline) with Daily Recording sessions.
Live Classes with Query Sessions / Batch Strength 15-20 Students, Regular Tests according to Industry Requirement. Free Ethical Hacking & Cyber Security Global Certification Practice.
Advance Assignments with Questions which are frequently asked in top MNC companies.
You will get tasks every day, also Labs, Assignments, Projects will be there.
Saturday doubt sessions and extra classes.
Direct interaction with trainers whenever needed.
Lifetime support even after placements.
Practical project-oriented training with strong theoretical foundation.
Resume Preparations Profile Building -----> Interview Preparations ------> 100% Job Assistant Support
ETHICAL HACKING Covers 2 Certifications
1. CEH (Certified Ethical Hacker )
2. EHE ( Ethical Hacking Expert )
- This profile is generally for the wholesome experienced people who tends to look after the complete security of the company along with the ultimate aim to help an organization improve its security.
- A Penetration Tester exploits the security vulnerabilities and issues in web-based applications, networks and systems of the organisation .In simple words, you get paid to use a series of penetration tools which are available in the market, purchased based , some that you design yourself to keep a check on the existing security hack attacks.
- This profile is for people who work as vulnerability testers or analysts , and their work is to detect the number of security loopholes and issues in the organization’s infrastructure, identifying each one of them and rectifying them.
- The people who work in a company to provide an auditing report of the security systems used by that company. A security auditor will then make the final report for the detailed information systems in the company to make the systems working and running more efficiently without vulnerabilities.
- An ethical hacker or a white hat hacke is an expert who systematically penetrates into a computer system or the network area or any application or software on behalf of the company with their permission ethically to find security vulnerabilities that can affect the system or the network of the company .
Placement Assistance
Live Project Assessment
Lifetime Career Support
Lifetime Training Membership
CEH & EHE Global Certification Based Preparation Included in Training