Ethical Hacking Course
- Session 1:
Need for Ethical Hacking.
Why we require Ethical Hackers?
Types of Hackers.
Steps in Ethical Hacking.
- Session 2:
Social Engineering and attacks.
Facebook , G mail , Instagram Hacking
- Session 3:
DOS and DDOS Attack.
Key logger(Hack Any SYSTEM)
- Session 4:
What is hardware hacking and how it is done?
The need for hardware hacking.
Devices used in hardware hacking.
USB rubber ducky and WIFI deauthentication practical.
- Session 5:
A man-in-the-middle attack, Evil Twin attack.
Malware, trojan and viruses.
Practical on Windows hacking.
How to protect yourself against attacks?