Hacksera Certified Ethical Hacker

Who should attend?

This course is an Entry-level course for beginners who want to be specialized in the field of cybersecurity.

Information Security ,Ethical hacking & network Fundamentals
  • Role of Information Security in Today’s Era
  •  Ethical Hacking Concepts
  •  Vulnerability Assessment & Penetration Testing
  •  Penetration Testing Standards
  •  Network Fundamentals
  •  Linux Basics
Social Engineering
  • Techniques in social engineering
  • Social engineering attacks
Concept of Footprinting
  • Information Gathering Methods Online
  •  Fingerprint Servers, Website, Services etc.
  •  Recon Kung-fu with Various Tools
Network Scanning Techniques
  •  Scanning Basics & Legal methods to Scan
  •   Scanning with Nmap
  •   Firewall Evasion
  •   Vulnerability Assessment With Nessus, Retina, Openvas etc.
Cracking Passwords,Brute Force & DOS Attacks
  • Microsoft Authentication
  •  How Hash Passwords Are Stored in Windows SAM?
  •  NTLM Authentication Process
  •  Kerberos Authentication
  •  Password Salting
  •  Tools to Extract the Password Hashes
  •  Password Cracking
    o Types of Password Cracking
    o Linux and Windows Bypassing
  • DOS attacks
Keylogger,Spyware and malwares
Metasploit Exploit Framework
  • Metasploit Architecture
  • Auxiliary Module
  • Metasploit Pro & GUI
  • Exploiting Systems & Servers
  • Automated Attacks With Metasploit
Web application Security

• OWASP Top 10
• Automated Sql Injection
• XSS Flows
• Shell File Upload
• Website Defacing

Wireless hacking
o Features of 802.11 Standard
o Packet types of 802.11 Standards
o 802.11 Protocol Analysis
o 802.11 authentication types
o WEP Cracking
o EVIL Twin attack
o WPA/WPA2 Cracking
Mobile application Security
  • Mobile architechure
  • Mobile device management
  • Reverse enginnering of mobile applications
  • Hacking into mobile devices
IOT fundamentals & Exploitation
  • Introduction of internet of things
  • IOT Architecture layers
  • IOT devices and technology
  • Comman IOT Attacks & Exploitation
Cloud Security & Assessment
  • Introduction to Cloud Security
  • Cloud Services models
  • Cloud Architechure
  • Security Challenges in the Cloud
  • Infrastructure Security in the Cloud
  • Risk, Audit, and Assessment for the Cloud
Security Operational Center
  • SOC fundamentals
  • Why SOC needed?
  • Log management and Splunk
Various Fields of Cyber Security & Career in cyber security
  • WEB Application Security
  •  Mobile Application Security
  •  Network Security
  •  Digital Forensics and Incident response
  •  SOC
  •  Compliance