Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. Ducat provides Best Ethical Hacking Training in noida based on industry standards that helps attendees to secure placements in their dream jobs at MNCs. Ducat Provides Best Ethical Hacking Training in Noida. Ducat is one of the most credible Ethical Hacking Training institutes in Noida offering hands on practical knowledge and full job assistance with basic as well as advanced level Ethical Hacking Training courses.

SESSION 1

  • Ethical hacking
  • Trainee Introduction
  • Introduction To Information Security
  • Cyber Laws- IT Amendment Act 2008

SESSION 2

  • Network Terminologies - I
  • Introduction To Networks
  • Network Protocols
  • IP Address
  • IP Subnet
  • NAT
  • DHCP Server

SESSION 3

  • Network Terminolgy – II
  • Ports
  • DNS
  • VPN
  • Proxy Servers
  • OSL Model
  • DNS Servers
  • TCP/IP Model
  • Web Technology Basics

SESSION 4

  • Information Gathering and Digital Foot Printing
  • OS Login Bypass

SESSION 5

  • Introduction to Malwares
  • Viruses
  • Worms
  • Keyloggers
  • Ransomeware

SESSION 6

  • Create Trojans
  • Evade Anti-Virus
  • Botnets and Rootlkits
  • Secure System Configuration

SESSION 7

  • Introduction to Web Architecture and Components
  • Web Security Misconceptions
  • HTML Basics
  • Server Setup
  • PHP Basics
  • Basic Web Application in HTML and PHP

SESSION 8

  • Phishing Attacks
  • Social Engineering
  • Email Encryption
  • Spear Phishing
  • Fake Emails
  • Email Tracking and Tracing

SESSION 9

  • Introduction to Vulnerability Assessment and Penetration Testing
  • Web Security Standards: OWASP Top 10
  • Introduction to DBMS
  • SQL Basics
  • SQL Injection - Authentication Bypass

SESSION 10

  • Insecure Direct Object Reference
  • Sensitive Data Exposure
  • DVWA Set Up and Configuration
  • Union Based SQL Injection

SESSION 11

  • Error Based SQL Injection
  • Stacked Query Injection

SESSION 12

  • Introduction to Firewall
  • Misconfigured Web Application Firewalls
  • Blind Injection

SESSION 13

  • Time Based SQL Injection
  • Post Parameter Injection
  • Arbitraty File Upload
  • Application to Automate VAPT

SESSION 14

  • Introduction To Burp Suite
  • Brute Force Using Burp Suite
  • File Inclusion Vulnerability
  • Command Execution Vulnerability
  • Authentication Bypass using Burp Suite
  • Proxy Servers, Intuder, Scanner, Spider, Repeater, Encoder

SESSION 15

  • Cross Site Scripting (XSS)
  • Reflected XSS
  • Stored XSS
  • DOM XSS
  • XSS Payloads
  • Broken Authentication and Session Management

SESSION 16

  • Cross Site Request Forgery (CSRF)
  • Missing Function Level Access Control
  • Invalidated Redirects and Forwards
  • Tools to Automate VAPT

SESSION 17

  • Linux Basics
  • Introduction to Penetration Testing OS
  • Wordlist Generator
  • ZAP - Linux Tool

SESSION 18

  • Introduction to Network Security
  • Basic Concepts and Terminologies
  • Basic Network Scanning
  • Network Attacks
  • ARP Poisioning
  • SSL Striping
  • DNS Spoofing
  • Network Exploitation Frameworks Xerosploit

SESSION 19

  • Introduction to Wireless Networking
  • Understand Security Configurations
  • Capturing Wireless Communication Packets
  • Attacks on WEP Encryption
  • Attacks on WPS / WPA 2 Encryption
  • Tools to Automate Attacks on Wireless Network

SESSION 20

  • Introduction to Mobile Platforms
  • Mobile OS Security Architecture | Android OS
  • Mobile Malware and Backdoors
COMMENCING NEW BATCHES
ENQUIRY FORM
FOLLOW US ON
SUBSCRIBE TO OUR NEWSLETTER

WE ACCEPT ONLINE PAYMENTS
PAY ONLINE