Enrolled: 0 students
Duration: 72 hours
Lectures: 197
Level: Beginner

Working hours

Monday 10:00 am - 7:00 pm
Tuesday 10:00 am - 7:00 pm
Wednesday 10:00 am - 7:00 pm
Thursday 10:00 am - 7:00 pm
Friday 10:00 am - 7:00 pm
Saturday 10:00 am - 7:00 pm
Sunday 10:00 am - 7:00 pm

Introduction

1
What is hacking
2
Ethical hacking
3
Who are hackers
4
Types of hackers
5
Hacking methodology
6
Indian cyber laws(IT Act 2000)

. Foot Printing & Scanning

1
How to check IP and Mac Address ping Command
2
Traceroute
3
Google Footprinting
4
Footprinting Using Social Engineering Whois lookup Query
5
Database and Web Footprinting Scanning
6
IP Scanners
7
Port Scanners
8
Network Scanning
9
IP and Domain Scanning
10
Web Vulnerabilities
11
Web Vulnerabilities Scanning Tools

Operating System Hacking & Security

1
Introduction to operating system windows hacking
2
Introduction to windows security Architecture
3
User Account Management Commands
4
Attacks on windows login password
5
Introduction to Registry linux Hacking
6
Introduction to linux
7
Cracking linux passwords steganography
8
Hiding data behind images
9
Steganalysis
10
Cryptography
11
Windows Security Keyloggers

Proxy server & Dark & Deep Concept

1
Identity masking:proxies
2
Introduction to proxies
3
Types of proxies
4
Web proxies
5
Anonymous proxy servers chain techniques
6
HTTP Tunneling
7
Un-Intentional proxies
8
Google as a proxy server
9
Tor
10
Dark web & Deep web links
11
VPN Concept
12
RDP Concept
13
Mac Spoofing Attack

Social Accounts Threats & Security

1
Phishing Attack
2
Browser level password stealing (keylogger)
3
System level password stealing
4
Emails:Attack and security
5
What is EMail and its working
6
What is an Email sreve
7
EMail Forgery
8
EMail spammers
9
EMail Bombers
10
Security to Anonymous Mailing
11
Attacks on Email Password
12
Secuirng the EMail Passwords
13
Whois loop query
14
Tracing EMail sender

Website Hacking Security

1
What is a website? What is a database?
2
What is a webserver?
3
Website security structure
4
Google dorks for website attacks Web server attacks (Theory)
5
Website Scanners
6
Database servers
7
Attacks on Database servers
8
SQL Injection
9
SQLMAP
10
Injection-Countermeasures

Network Attacks and Security

1
Introduction to Networking
2
Devices and Terminologies in networking attacks on networks
3
Sniffing
4
ARP Poisoning
5
Denial of service(Introduction)
6
Distributed Denial of service(Introduction)
7
MAC Flooders

Malware Threats & Countermeasures

1
Introduction to Trojans
2
Usage of Trojans
3
Developing a server file viruses
4
Introduction to Viruses
5
Batch Programming
6
Using Batch Compliers
7
Virus Writing
8
VB Programming
9
Virus Development in visual basics Introduction to Malwares
10
Introduction to Anti-Viruses removal of malwares
11
Working of Anti-Viruses
12
Manual Removal of Viruses,Trojans and key loggers

Mobile Hacking & Security

1
Introduction to mobile Technology VOIP – Definition and Usage
2
Introduction to SIP Lines call forgery Techniques
3
Anonymous Calling Caller ID Spoofing
4
SMS Forgery
5
Mobile hacking using spyware mobile hacking payload making

Software Reverse Engineering

1
What is Reverse Engineering?Disassembling the software Debugging the Software
2
Software Cracking & Serial key phishing software patch development
3
Applying Application Security
4
Introduction to application security
5
Using the Setup Encrypts
6
Applying Strong serial key Algorithms

Python Programming

1
Variables in python
2
Conditional Loops in python
3
Function definition in python
4
Try catch function in python
5
Global & Local Variables
6
Class & Object in python
7
Inheritance,Polymorphism,Overloading
8
File Operations in python
9
Regular Expression in python

Metasploit Framework

1
Metasploit User Interface
2
Metasploit Framework Architecture
3
Various Interfaces of Metasploit framework
4
Payloads,Auxiliaries,Modules
5
Exploits and attacks
6
Armitage GUI based attack
7
Vulnerability Analysis Exploitation on various platforms Evade Anti-Virus
8
Firewalls metasploit on various platforms evade Anti-virus
9
Firewalls metasploit Scripting
10
Eternal blue double pulsar exploitation
11
SMB or 445 exploitation using metasploit
12
Ways to deliver Exploits

Machine Cracking

1
Machine Name – VULUNI 1
2
Load machine In VM
3
Scan machine vulnerabilities
4
Enumeration
5
Machine source code review
6
VulnerabilityExploitation
7
Database Vulnerability scanning
8
Database Exploitation
9
Inject reverse shell (Server Exploitation)
10
Maintaining Access

Manual Database Hacking

1
Database Penetraton testing
2
What is database & database examples
3
Database management system
4
All Database Quarries concepts
5
Database Identification and testing
6
Types of database
7
MySQL SQL Injection
8
Enumerating the database
9
Column number Enumeration
10
Understanding the layout of output
11
Extracting data from the database
12
Leveraging SQL Injection for the code Execution database testing using tools
13
Database hacking using commands
14
MOD or WAF security Bypass
15
Hack bar or manually website hacking

OWASP TOP 10

1
OWASP Top 10 Attacks
2
Cross site Scripting
3
Sensitive data exposure
4
Insecure direct object references
5
SQL Injections
6
Authentication Bypass Injection
7
Blind Injections
8
Error Based Injection
9
Union based Injection
10
Time based Injection
11
Broken Authentication and session management
12
CSRF
13
Missing function level access control
14
Unvalidated Redirects and forwards
15
Security Misconfiguration
16
Using components with known vulnerabilities

Cryptography

1
What is cryptography?
2
Types Cryptography
3
Algorithms used in cryptography
4
DES Algorithm
5
AES Algorithm
6
RSA Algorithm
7
Hashing Algorithms
8
MD5 Algorithm
9
SHA Algorithm
10
SSL Algorithm
11
Modes of cryptography
12
Cryptography practical using python

IDS

FIREWALL & Honeypot

1
IDS,Firewall,Honeypot concepts & configuration
2
Types of IDS
3
Indication of Intrusions
4
Firewall Architecture & configuration
5
Evading Firewall and IDS
6
Honeypot setup and Indetification
7
Evading IDS technique
8
Evading firewall technique
9
Evading WAF Security

Cloud Computing & IOT Attacks

1
Cloud & IOT Attacks & Security
2
What is cloud computing ?
3
Types of clouds
4
Attacks on cloud technology
5
IOT Basics concepts
6
Types of sensors
7
Arduino & Rasberry pi
8
Attacks on IOT Technology

Wireless Technology Attacks

1
Wireless networks(Wi-Fi)
2
Introduction to wireless fidelity
3
Advantages/Disadvantages of wireless networks wireless encryption keys
4
WEP
5
WAP
6
Modes of wireless network cards
7
Managed mode
8
Monitor mode
9
Ad-Hoc mode
10
Working on Ad-Hocs
11
WIFI HACKING USING KALI LINUX

Cyber Game And Bug Bounty

Be the first to add a review.

Please, login to leave a review