Ethical Hacking Course

  • Session 1:
    Need for Ethical Hacking.
    Why we require Ethical Hackers?
    Types of Hackers.
    Steps in Ethical Hacking.

  • Session 2:
    Information gathering.
    Footprinting.
    Scanning.
    Enumeration.
    Social Engineering and attacks.
    Facebook , G mail , Instagram Hacking

  • Session 3:
    DOS and DDOS Attack.
    Session hijacking.
    Steganography.
    Cryptography.
    Key logger(Hack Any SYSTEM)

  • Session 4:
    What is hardware hacking and how it is done?
    The need for hardware hacking.
    Devices used in hardware hacking.
    USB rubber ducky and WIFI deauthentication practical.

  • Session 5:
    A man-in-the-middle attack, Evil Twin attack.
    Malware, trojan and viruses.
    Phishing.
    Practical on Windows hacking.
    How to protect yourself against attacks?