+91- 84000 84111
Summer Training Program 2017

Ethical Hacking Level -1

Recomended for: Students , Entrepreneurs

Course Objectives
    The Course will allow learners
  • Improve your CV & Apply for more right job interviews.
  • Learn what others will learn later.
  • High career growth with advanced skills.
  • Work part time as a freelancer along with your studies
  • Have increased self esteem and respect from fellows.
  • Give companies extra reasons to hire you.
  • Secure your personal data.

Syllabus Overview
  • 1. SAM File And Services Location In Windows.
  • 2. VmWare Windows Installation/Configuration.
  • 3. Hacking Windows User Account Using:-
  • > Kon Boot.
  • >Nt Offline Cracker
  • > Ophcrack.
  • > Sethc Backdoor Creation.
  • 4. Deploying Syskey,Bios,Device Priority Protection.
  • 5. Breaking Syskey Protection Using NTOffline Cracker.
  • 6. Making Your Desktop Computer As A Web Server.
  • 7. Sending Phished Passwords Directly To your mailbox.
  • 8. Blocking Websites Locally On Your Desktop/Pc.
  • 9. Creating Viruses And Its CounterMeasures.
  • 10. Customizing Window using Registery Editor.
  • 11. Using Access Manager Tool.
  • 12. CMD Commands:-
  • >Ip Release/Renew
  • >Ping,Ipconfig,Getmac,Nslookup
  • >Banner Grabbing Using Telnet
  • >Tracert
  • >Nslookup
  • 13. Sending Spoofed Emails.
  • 14. Tracing Mail Origination.
  • 15. Desktop Phishing.
  • 16. Making Your Pc As Phishing Remote Host.
  • 17. Uploading Phished Page To Web Server.
  • 18. Whois And Information Gathering
  • >Who.is
  • >Angry Ip-Scanner
  • >Nmap
  • >Maltego
  • 19. Sending Fake Mail And Tracing it.
  • 20. Usage Of Phish Tank And Netcraft Toolbar
  • 21. Accessing Any Computer Remotely Online Using RAT.
  • 22. MITM Attack.
  • 23. Sniffing Passwords in LAN.
  • 24. Linux Commands Usage.
  • 25. Creating Backdoor Using Metasploit to exploit Win7 Machine.
  • 26. Exploiting Windows XP Machine.
  • 27. DDosing Website
  • 28. Stealing Passwords.
  • 29. Java Drive By.
  • 30. Using Netcat As Backdoor.
  • 31. Making Your Keyloggers/Rat FUD.
  • 32. Using Keylogger To Record Keystrokes Of Victims PC.
  • 33. Creating Your Own Botnet.
  • 34. Hacking Website Database
  • >Admin Authentication Bypass.
  • >My-Sql Injection.
  • > Manual Sqlinjection Using Tools.
  • 35. Exploiting XSS Vulnerability And Cookie Stealing.
  • 36.Cracking Wifi Password
  • 37. Reverse Engineering
  • 38. Using Anonymizer To Block Website
  • 39. Cryptography And Steganography
  • 40. Recovering Files Deleted From Recycle-Bin.
  • 41. Making Dynamic Ip Static.
  • 42. Kicking Anyone from wireless network.
  • 43. Website Vulnerability Scanning.
  • 44. Email Spamming And Bombing.
  • 45. Creating Macro-undetectable virus for windows.
  • 46. Desktop Phishing
  • 47.Sharing Data On LAN Manually

Close
Select Your Training Location

Type your e-mail address and we'll send you new password

Submit