get app
Popular Searches
Engineering and Architecture
Management and Business Administration
Law
Learn
Media, Mass Communication and Journalism
Animation and Design
Medicine and Allied Sciences
Arts, Commerce & Sciences
Computer Application and IT
Online Courses and Certifications
Hospitality and Tourism
Pharmacy
Finance & Accounts
Competition
Study Abroad
School
Engineering and Architecture
Change
Exams
JEE Main Exam
BITSAT Exam
JEE Advanced Exam
VITEEE Exam
UPESEAT- B.Tech
AEEE Exam
CUCET Exam 2025
View All Engineering Exams
Colleges
Colleges Accepting B.Tech Applications
Top Engineering Colleges in India
Engineering Colleges in India
Engineering Colleges in Tamil Nadu
Engineering Colleges Accepting JEE Main
Top IITs in India
Top NITs in India
Top IIITs in India
Predictors
JEE Main College Predictor
JEE Main Rank Predictor
MHT CET College Predictor
AP EAMCET College Predictor
GATE College Predictor
KCET College Predictor
JEE Advanced College Predictor
View All College Predictors
Resources
JEE Main 2025 Admit Card
JEE Main Cutoff
GATE 2025 Admit Card
JEE Main Syllabus 2025
Download E-Books and Sample Papers
Compare Colleges
B.Tech College Applications
JEE Main Question Papers
Quick links
BTech
M.Tech
Computer Science Engineering
Mechanical Engineering
Civil Engineering
Aeronautical Engineering
Information Technology
Electronic Engineering
Management and Business Administration
Change
Exams
XAT Exam
CAT Exam
IBSAT Exam
MAH MBA CET
MAT Exam
CMAT Exam
SNAP Exam
View All Management Exams
Colleges & Courses
Top MBA Colleges in India
MBA College Admissions
MBA Colleges in India
Top IIMs Colleges in India
Top Online MBA Colleges in India
Online MBA
MBA Colleges Accepting XAT Score
BBA Colleges in India
Predictors
XAT College Predictor 2025
SNAP College Predictor
NMAT College Predictor
MAT College Predictor 2025
CMAT College Predictor 2025
CAT Percentile Predictor 2025
CAT 2025 College Predictor
View All
Resources
Top MBA Entrance Exams in India
MAH MBA CET CAP 2025
GD Topics for MBA
AP ICET 2025 Counselling
Download Helpful Ebooks
List of Popular Branches
QnA - Get answers to your doubts
IIM Fees Structure
Quick Links
Executive MBA
Part Time MBA
Distance MBA
PGDM
TS ICET Results 2025
Law
Change
Exams
CLAT
AILET
SLAT
AP LAWCET
MH CET Law
AIBE
ULSAT-LLB
View All
Colleges
Colleges Accepting Admissions
Top Law Colleges in India
Law College Accepting CLAT Score
List of Law Colleges in India
Top Law Colleges in Delhi
Top NLUs Colleges in India
Top Law Colleges in Chandigarh
Top Law Collages in Lucknow
Predictors & E-Books
CLAT College Predictor
MHCET Law ( 5 Year L.L.B) College Predictor
AILET College Predictor
Sample Papers
E-Books & Sample Papers
CLAT Rank Predictor
Resources
Compare Law Collages
QnA - Get answers to your doubts
Careers360 Youtube Channel
CLAT Syllabus
Free CLAT Practice Test
Quick Links
LLB
LLM
BA LLB
BBA LLB
Cyber Law
Corporate Law
Learn
Change
Engineering Preparation
JEE Main Free Mock Test
BITSAT Free Mock Test
VITEEE Free Mock Test
MET Free Mock Test
Medical Preparation
NEET UG Free Mock Test
NEET PG Free Mock Test
Law Preparation
CLAT Free Mock Test
AILET Free Mock Test
AP LAWCET Free Mock Test
TS LAWCET Free Mock Test
MBA Preparation
CAT Free Mock Test
MAT Free Mock Test
XAT Free Mock Test
CMAT Free Mock Test
Media, Mass Communication and Journalism
Change
Exams
JMI Mass Communication Entrance Exam 2025
IIMC Entrance Exam 2025
NPAT 2025
View All
Colleges
Compare Colleges
Media & Journalism colleges in Delhi
Media & Journalism colleges in Bangalore
Media & Journalism colleges in Mumbai
Colleges Accepting Admissions
List of Media & Journalism Colleges in India
View All
Resources
Free Ebooks
Free Sample Papers
List of Popular Branches
QnA - Get answers to your doubts
Careers360 Youtube Channel
Quick Links
Mass Communication
Journalism
Event Management
Animation and Design
Change
Exams
NIFT 2025
UCEED Exam
NID DAT Exam
JNAFAU FADEE Exam
CEED Exam
FDDI AIST Exam
MITID DAT Exam
View All
Colleges
Design Colleges in India
Top Design Colleges in India
Top NIFT Colleges in India
Fashion Design Colleges in India
Top Interior Design Colleges in India
Top Graphic Designing Colleges in India
Fashion Design Colleges in Delhi
Fashion Design Colleges in Mumbai
Predictors & Articles
NIFT College Predictor
UCEED College Predictor
NID DAT College Predictor
NIFT 2025 Result
NIFT 2025 Counselling
NIFT 2026 Preparation
NID DAT 2026 Preparation
UCEED 2026 Preparation
Resources
NIFT Cutoff 2025
NIFT Cutoff 2024
NIFT Fees Structure
Free Design Sample Papers
Free Design E-books
List of Branches
QnA - Get answers to your doubts
Careers360 Youtube channel
Quick Link
BDes
M.Des
Fashion Designing
Interior Design
Textile Design
Communication Design
Accessory Designing
Jewellery Design
Medicine and Allied Sciences
Change
Exams
NEET
NEET PG
NEET MDS
FMGE
INI CET
AIIMS Nursing
AIAPGET
View All Medicine Exams
Colleges
Top Medical Colleges in India
Top Medical Colleges in India accepting NEET Score
Medical Colleges accepting NEET
List of Medical Colleges in India
List of AIIMS Colleges In India
Medical Colleges in Maharashtra
Medical Colleges in India Accepting NEET PG
Predictors
NEET College Predictor
NEET PG College Predictor
NEET MDS College Predictor
NEET Rank Predictor
DNB PDCET College Predictor
View All
Resources
NEET Syllabus 2026
NEET 2025 Final Answer Key
NEET Cut off
NEET Result 2025
Download Helpful E-books
QnA - Get answers to your doubts
Quick Links
MBBS
MD
MPT
MPH
BAMS
MS (Master of Surgery)
BUMS
BHMS
Arts, Commerce & Sciences
Change
Exams
CUET Exam
CUET PG 2025
NFAT 2025
NEST 2025
UP B.Ed JEE 2025
TS EDCET Exam 2025
IIT JAM 2025
AP PGCET Exam
Colleges
Universities in India
Top Universities in India 2025
Top Colleges in India
Top Universities in Uttar Pradesh 2025
Top Universities in Bihar
Top Universities in Madhya Pradesh 2025
Top Universities in Tamil Nadu 2025
Central Universities in India
Upcoming Events
DU Cut Off 2025
IGNOU Date Sheet 2025
CUET 2026
CUET Cut Off 2025
BHU PG Application Form 2025
CUET Participating Universities 2025
CUET Previous Year Question Paper
IGNOU Result
Resources
E-Books and Sample Papers
CUET College Predictor 2025
Cotton University Merit List 2025
CUET PG Couselling 2025
CUET PG Cut Off 2025
IGNOU Exam Form
CUET Syllabus
CUET Counselling 2025
Quick Links
BA
MA
MSW
B.Sc
M.Sc.
B.Ed
Computer Application and IT
Change
Exams
NIMCET
View All
Colleges
Compare Colleges
IT Colleges in Tamil Nadu
IT Colleges in Uttar Pradesh
Colleges Accepting Admissions
MCA Colleges in India
BCA Colleges in India
Resources
Sample Papers
Free Ebooks
QnA - Get answers to your doubts
Careers360 Youtube Channel
Quick Links
MCA
BCA
Information Technology Courses
Programming Courses
Web Development Courses
Data Analytics Courses
Big Data Analytics Courses
Online Courses and Certifications
Change
Top Streams
IT & Software Certification Courses
Engineering and Architecture Certification Courses
Programming And Development Certification Courses
Business and Management Certification Courses
Marketing Certification Courses
Health and Fitness Certification Courses
Design Certification Courses
View All
Specializations
Digital Marketing Certification Courses
Cyber Security Certification Courses
Artificial Intelligence Certification Courses
Business Analytics Certification Courses
Data Science Certification Courses
Cloud Computing Certification Courses
Machine Learning Certification Courses
View All Certification Courses
Resources
UG Degree Courses
PG Degree Courses
Online MBA
Short Term Courses
Free Courses
Online Degrees and Diplomas
Compare Courses
Top Providers
Coursera Courses
Udemy Courses
Edx Courses
Swayam Courses
upGrad Courses
Simplilearn Courses
Great Learning Courses
View All
Hospitality and Tourism
Change
Exams
NCHMCT JEE 2025
Mah BHMCT CET
MAH HM CET
PUTHAT
IHM-A
View All
Colleges
Top Hotel Management Colleges in Delhi
Top Hotel Management Colleges in Hyderabad
Top Hotel Management Colleges in Mumbai
Top Hotel Management Colleges in Tamil Nadu
Top Hotel Management Colleges in Maharashtra
View All
Resources
Free Hospitality E-books
Free Hospitality Sample Papers
BHM Course
B.Sc Hotel Management
Hotel Management
Diploma in Hotel Management and Catering Technology
List of Popular Branches
Diploma Colleges
Top Diploma Colleges in Maharashtra
Top Diploma Colleges in Uttrakhand
Pharmacy
Change
Exams
GPAT
RUHS Pharmacy Admission Test
KAHER-AIET
NIPER JEE
UPESPAT
View All
Colleges
Top Pharmacy Colleges in India
Pharmacy Colleges in Pune
Pharmacy Colleges in Mumbai
Colleges Accepting GPAT Score
Pharmacy Colleges in Lucknow
List of Pharmacy Colleges in Nagpur
View All
Resources
GPAT Result
GPAT 2025 Admit Card
GPAT Question Papers
B. Pharma
M. Pharma
Free Ebooks
Free Sample Papers
Careers360 Youtube Channel
Quick Links
GPAT 2025
Top Pharmacy Colleges in India
List of Pharmacy Colleges in India accepting GPAT
Finance & Accounts
Change
Exams
CA Intermediate
CA Foundation
CA Final
CS Executive
CS Professional
CFA Exam
CSEET
ACET
Resources
Difference between CA and CS
Difference between CA and CMA
CA Full form
CMA Full form
CS Full form
E-books and Sample Papers
Free Sample Papers
CA Salary In India
Top Courses & Careers
Bachelor of Commerce (B.Com)
Master of Commerce (M.Com)
Company Secretary
Cost Accountant
Charted Accountant
Credit Manager
Financial Advisor
Colleges
Top Commerce Colleges in India
Top Government Commerce Colleges in India
Top Private Commerce Colleges in India
Top M.Com Colleges in Mumbai
Top B.Com Colleges in India
Competition
Change
Exams
NDA Exam
UPSC IAS Exam
CDS Exam
AFCAT Exam
SSC CGL Exam
IBPS RRB Exam
CTET Exam
View All
Upcoming Events
AFCAT 1 Result 2025
UPSC CAPF Admit card 2025
SSC GD Constable Result 2025
UPSC CMS Admit Card 2025
RRB ALP Result 2025
CTET Notification 2025
NDA 1 Admit card 2025
CDS 1 Admit Card 2025
Resources
Previous Year Sample Papers
Free Competition E-books
Sarkari Result
QnA- Get your doubts answered
UPSC Previous Year Sample Papers
CTET Previous Year Sample Papers
SBI Clerk Previous Year Sample Papers
NDA Previous Year Sample Papers
Other Exams
TNPSC Group 4 Exam
UPSC CMS Exam
UPSC IFS Exam
UGC NET Exam
RRB NTPC Exam
IBPS PO Exam
IBPS Clerk Exam
SSC GD Constable Exam
Study Abroad
Change
Exams
TOEFL
PTE
IELTS
GMAT
GRE
SAT
LNAT UK
View All
Colleges
Top University in USA
Top University in Canada
Top University in Ireland
Top Universities in UK
Top Universities in Australia
Best MBA Colleges in Abroad
Business Management Studies Colleges
View All
Top Countries
Study in USA
Study in UK
Study in Canada
Study in Australia
Study in Ireland
Study in Germany
Study in China
Study in Europe
Resources
Student Visa Canada
Student Visa UK
Student Visa USA
Download E-books and Sample Papers
Free Exam Sample Papers
IELTS Reading Practice E-book
IELTS 2025 Writing Task 1 & Task 2
Know All About Education Loan
School
Change
Exams
CBSE Class 10th
CBSE Class 12th
UP Board 10th
UP Board 12th
Bihar Board 10th
Bihar Board 12th
View All
Top Schools
Top Schools in India
Top Schools in Delhi
Top Schools in Mumbai
Top Schools in Chennai
Top Schools in Hyderabad
Top Schools in Kolkata
Top Schools in Pune
Top Schools in Bangalore
Products & Resources
JEE Main Knockout April
Free eBooks & Sample Papers
RD Sharma Solutions
10th Board Exam Results 2025
12th Board Exam Results 2025
State Boards Results 2025
NCERT Study Material
NCERT Notes
NCERT Books
NCERT Syllabus
NCERT Solutions
NCERT Solutions for Class 12
NCERT Solutions for Class 11
NCERT solutions for Class 10
Quick Links
Top Schools in India
QnA - Get Answers to your Doubts
Login
Fee
The syllabus
Articles
Fee
The syllabus
Articles
Home
Mindmajix Technologies
Courses
Ethical Hacking Training in Hyderabad
Ethical Hacking Training in Hyderabad
BY
Mindmajix Technologies
Brochure
Enquire
Online
₹ 9600
12000
Quick Facts
particular
details
Medium of instructions
English
Mode of learning
Self study, Virtual Classroom
Mode of Delivery
Video and Text Based
Frequency of Classes
Weekdays, Weekends
Course and certificate fees
Fees information
₹ 9,600
₹12,000
certificate availability
Yes
certificate providing authority
Mindmajix Technologies
The syllabus
Module 1: Introduction to Information Security
Chapter 1.1: Information Security Overview
Important Terminology
Components of Information Security
Functionality, Usability, and Security
Chapter 1.2: Information Security Attack and Threats vendors
Objectives of the Information Security Attacks
Kinds of Information Security Threat
Kinds of Attacks on the System
Best Information Security Attack Vendors
Information warfare
Chapter 1.3: Hacking
Define Hacking
Hacker Classes
Hacker Phases
Reconnaissance
Scanning
Gaining and Maintaining Access
Clearing Tracks
Chapter 1.4: Ethical Hacking Concepts
Define Ethical Hacking
Importance of Ethical Hacking
Extent and Restrictions of Ethical Hacking
Expertise of an Ethical Hacker
Chapter 1.5: Controls of Information Security
Information Assurance
Information Security Management Program
Enterprise Information Security Architecture
Network Security Zoning
Policies of Information security
Kinds of Security Policies
Security Policies examples
Creating and Implementing Security Policies
Private policies at office
Chapter 1.6: Physical Security
Kinds of Physical Security Control
Physical Security Control
Chapter 1.7: Risk
Risk Management
Important Roles and Functions in Risk Management
Chapter 1.8: Threat Modeling
Chapter 1.9: Incident Management
Module 2: FootPrinting and Reconnaissance
Chapter 2.1: FootPrinting Concepts
Define FootPrinting
Intent of FootPrinting
Chapter 2.2: FootPrinting through the Search Engines
FootPrinting using search engines and modern Google Hacking Techniques
Collecting Information through Google Advanced Search and Image Search
Google Hacking Database
VPN and VoIP FootPrinting through the Google Hacking Database
Chapter 2.3: FootPrinting using Web Services
Discovering the Organization's Top-Level Domains and Sub-domains
Discovering the Geographical location of the Intent
People Search on People Search Sites and Social Networking Sites
Collecting Information from LinkedIn and Financial Services
FootPrinting using Job sites
Monitoring Target through Alerts
Collecting Information through Groups, Forms, and Blogs
Chapter 2.4: Website FootPrinting and Email FootPrinting
Website FootPrinting through Web Spiders
Mirroring Entire website and Fetching website information from www.archieve.org
Fetching Metadata of Public Documents and Controlling the web pages for changes and updates.
Tracing Email Communication
Gathering Information from the Email Header
Email Tracking Tools
Chapter 2.5: DNS FootPrinting and Network FootPrinting
Fetching DNS Information and DNS examination tools
Finding the Network Range
Traceroute and Traceroute Tools
Chapter 2.6: FootPrinting Tools
Maltego and Recon-ng
FOCA and Recon-Dog
OSRFramework and Other FootPrinting Tools
Chapter 2.7: FootPrinting Counterattacks and Pen Testing
FootPrinting Counterattacks
FootPrinting Report Templates
Module 3: Network Scanning
Chapter 3.1: Network Scanning Basics
Network Scanning Overview
TCP communication flags
TCP/IP communication
Setup custom packet through TCP flags
Scanning in IPV6 Networks
Chapter 3.2: Network Scanning Tools
Nmap
Hping2/Hping3
Scanning Tools for Web and Mobile
Chapter 3.3: Network Scanning Techniques
Scanning Techniques
Port scanning Counterattacks
Chapter 3.4: Network Diagrams
Drawing Network Diagrams
Network Discovery and Mapping Tools
Network Discovery Tools for Mobile
Chapter 3.5: Scanning IDS, Firewall, and Pen Testing
IDS or Firewall Evasion Techniques
Scanning Pen Testing
Module 4: Enumeration
Chapter 4.1: Enumeration Basics
Define Enumeration
Enumeration Techniques
Ports and Services to Enumerate
Chapter 4.2: NETBIOS Enumeration
NETBIOS Enumeration Tool
Enumerating user Accounts and Shared Resources
Chapter 4.3: SNMP and LDAP Enumeration
Working of SNMP Enumeration
Management Information Base
SNMP Enumeration Tools
LDAP Enumeration Tools
Chapter 4.4: NTP Enumeration, SMTP Enumeration, and DNS Enumeration
NTP Enumeration Commands and Tools
SMTP Enumeration Tools
DNS Enumeration through Zone Transfer
Chapter 4.5: Additional Enumeration Techniques
IPsec Enumeration
VoIP Enumeration
RPC Enumeration
Linux/Unix user Enumeration
Chapter 4.6: Enumeration Counterattacks and Pen Testing
Enumeration Counterattacks
Enumeration Pen Testing
Module 5: Vulnerability Analysis
Chapter 5.1: Vulnerability Assessment Concepts
Vulnerability Analysis
Vulnerability Categorization
Kinds of Vulnerability Assessment
Vulnerability Management Life cycle
Chapter 5.2: Vulnerability Assessment Solutions
Contrasting Approaches for Vulnerability Assessment
Vulnerability Scanning Solutions working
Kinds of Vulnerability Assessment Tools
Characteristics of a Good Vulnerability Assessment Solution
Selecting a Vulnerability Assessment Tool
Criteria or Standards for selecting a Vulnerability Assessment Tool
Best methods for Choosing Vulnerability Assessment Tools
Chapter 5.3: Vulnerability Scoring Systems
Common Vulnerability Scoring System(CVSS)
Common Vulnerabilities and Exposures(CVE)
National Vulnerability Database
Vulnerability Research Resources
Chapter 5.4: Vulnerability Assessment Tools
Nessus Professional
GFI LanGuard
Qualys Vulnerability Management
Qualys FreeScan
Nikto
Retina CS
OpenVAS
SAINT
Microsoft Baseline Security Analyzer
Automated Vulnerability Detection System
Vulnerability Assessment Tools for Mobile
Chapter 5.5: Vulnerability Assessment Reports
Vulnerability Assessment Reports Basics
Analyzing the Vulnerability Scanning Reports
Module 6: System Hacking
Chapter 6.1: CEH Hacking Methodology(CHM)
Chapter 6.2: System Hacking Objectives
Chapter 6.3: Password Cracking
Chapter 6.4: Kinds of Password Attacks
Non-Electronic Attack
Active Online Attack
Passive Online Attack
Chapter 6.5: Password Recovery Tools
Chapter 6.6: Microsoft Authentication
Chapter 6.7: Storing Hash Passwords in Windows SAM
Chapter 6.8: NTLM Authentication Process
Chapter 6.9: Kerberos Authentication
Chapter 6.10: Password Salting and Cracking Tools
Chapter 6.11: Tools for Extracting the Password Hashes
Chapter 6.12: How to Defend against LLMNR/NBT-NS Poisoning and Password Cracking
Chapter 6.13: Escalating Privileges
Chapter 6.14: Tools to Execute Applications
Chapter 6.15: Keylogger
Chapter 6.16: Spyware
Chapter 6.17: How to Defend against Keylogger and Spyware
Chapter 6.18: RootKits
Kinds of RootKits
RootKits working
Steps to Detect RootKits
Defend Against RootKits
Anti-RootKits
Chapter 6.19: NTFS Data Stream
Creating NTFS Streams
Manipulating NTFS Streams
Defend Against NTFS Streams
NTFS Stream Detectors
Chapter 6.20: Steganography
Categorization of Steganography
Kinds of Steganography
Document Steganography
Video and Audio Steganography
Email/Spam Steganography
Folder Steganography
Image Steganography Tools
Whitespace Steganography
Steganography Tools for Mobile Phones
Steganalysis
Steganalysis Methods and Attacks on Steganalysis
Detecting Steganography
Steganography Detection Tools
Chapter 6.21: Covering Tracks
Deactivating Auditing: Auditpol
Clearing Logs
Covering Tracks
Covering Tracks tools
Covering Tracks on OS and Network
Covering Tracks Tools
Module 7: Malware Threats
Chapter 7.1: Malware Fundamentals
Introduction to Malware
Different methods by which Malware can get into a system
General Techniques which Attackers use for Distributing the Malware on the web
Components of Malware
Chapter 7.2: Trojan Basics
Define Trojans
How Hackers use Trojans
General Ports used by the Trojans
How to Infect systems through a Trojan
Trojan Horse Construction Kit
Wrappers and Crypters
How Attackers Deploy the Trojan
Avoiding Anti-virus Techniques
Kinds of Trojans
Remote Access Trojans
BotNet Trojans
Backdoor Trojans
RootKit Trojans
E-banking Trojans
Proxy Trojans
Mobile Trojans
IoT Trojans
Exploit Kits
Chapter 7.3: Worms and Virus Concepts
Virus Basics
Stages of Virus life
Working with Viruses
Signs of Virus Attack
How Virus Infects a computer
Virus Hoaxes
Fake Antivirus
Ransomware
Kinds of Viruses
Creating Virus
Computer Worms and Worm Makers
Chapter 7.4: Malware Analysis
Sheep Dip Computer
Anti-Virus Senor Systems
Malware Analysis Basics
Preparing Testbed
Static and Dynamic Malware Analysis
Virus Detection Ways
Trojan Analysis: ZeuS/Zbot
Virus Analysis: WannaCry
Chapter 7.5: Counterattacks
Trojan and Backdoor Counterattacks
Virus and Worms Counterattacks
Chapter 7.6: Anti-Malware Software
Anti-Trojan and Antivirus software
Chapter 7.7: Malware Penetration Testing
Module 8: Sniffing
Chapter 8.1: Sniffing Basics
Network Sniffing
Basics of Sniffing
How an attacker uses Sniffing to Hack the Network
Protocols exposed to Sniffing
Sniffing in the Data Link Layer
Hardware Protocol Analyzers
SPAN Port
Wiretapping and Lawful Interception
Chapter 8.2: MAC Attacks
MAC Address or CAM Table
CAM Working
What Happens when the CAM Tables is Full?
MAC Flooding
Switch Port Stealing
Defending MAC Attacks
Chapter 8.3: Sniffing Technique: DHCP Attacks
DHCP Working
DHCP Request/Reply Messages
DHCP Starvation Attack
Rogue DHCP Server Attack
Defending DHCP Starvation and Rogue Server Attack
Chapter 8.4: Sniffing Technique: ARP Poisoning
Address Resolution Protocol
ARP Spoofing Attack
ARP Poisoning Threats
ARP Poisoning Tools
Defending ARP Poisoning
Dynamic ARP Inspection and Configuring DHCP Snooping
ARP Spoofing Detection Tools
Chapter 8.5: Spoofing Attacks
MAC Duplicating/Spoofing
Windows
MAC Spoofing Tools
IRDP Spoofing
Defending MAC Spoofing
Chapter 8.6: DNS Poisoning and Sniffing Tools
DNS Poisoning Techniques
Defending DNS Poisoning
Wireshark
Packet Sniffing Tools for Mobile
Chapter 8.7: CounterAttacks and Sniffing Detection Techniques
Defending Sniffing
Detect Sniffing
Sniffer Detection Techniques
Promiscuous Detection Tools
Sniffing Penetration Testing
Module 9: Social Engineering
Chapter 9.1: Social Engineering Basics and Techniques
Define Social Engineering
Social Engineering Attack Phases
Types of Social Engineering
Human-based and Computer-based Social Engineering
Mobile-based Social Engineering
Chapter 9.2: Impersonation on Social Networking Sites
Social Engineering using Impersonation on Social Networking
Impersonation on Facebook
Risks of Social Networking Threats for Corporate Networks
Chapter 9.3: Identity Theft and Counterattacks
Identity Theft concepts
Social Engineering Counterattacks
Insider Threats Counterattacks
Identity Theft Counterattacks
Detecting Phishing Emails
Anti-Phishing Toolbar
General Social Engineering Targets and Defense Strategies
Chapter 9.4: Social Engineering Penetration testing and Insider Threats
Social Engineering Penetration Testing Tools
Types of Insider Threats
Module 10: Denial-of-Service(DoS)
Chapter 10.1: DoS and DDoS Concepts
Define DoS Attack
What is Distributed Denial-of-Service Attack
Chapter 10.2: DoS and DDoS Attack Techniques
Basic Classification of DoS and DDoS Attack vendors
UDP and ICMP Flood Attack
Ping of Smurf and Death Attack
SYN Flood Attack
Fragmentation Attack
HTTP GET/POST and Slowloris Attacks
Multi-Vector Attack
Peer-to-Peer Attacks
Permanent DoS
Distributed Reflection Denial-of-Service(DRDoS)
Chapter 10.4: Botnets and DDoS Case Study
Botnet
General Botnet Setup
Botnet Ecosystem
Scanning methods to Find Vulnerable Machines
How Malicious Code Propagates?
Botnet Trojan
DDoS Attack
Hackers Advertise Links for Downloading Botnet
Use of Mobile Devices as Botnets to Launch DDoS Attacks
Dyn DDoS Attack
Chapter 10.5: DoS and DDoS Attack Tools and Counterattacks
DoS and DDoS Attack Tools for Web and Mobile
Detection Techniques
DoS/DDoS Counterattack Strategies
DDoS Attack Counterattacks
Techniques for Defending Botnets
DoS and DDoS Counterattacks
DoS and DDoS Protection at ISP level
Enabling TCP Internet on Cisco IOS Software
Chapter 10.6: DoS and DDoS protection tools and Penetration Testing
Modern DDoS Protection Appliances
DoS and DDoS Protection Tools
DoS and DDoS Attack Penetration Testing
Module 11: Session Hijacking
Chapter 11.1: Session Hijacking Basics
Define Session Hijacking
Importance of Session Hijacking
Session Hijacking Process
Kinds of Session Hijacking
Session Hijacking in OSI Model
Differentiate Hijacking and Spoofing
Packet Analysis of a Local Session Hijack
Chapter 11.2: Application Level Session Hijacking
Compromising Session IDs through Sniffing and by Predicting Session Token
Predicting a Session Token
Compromising Session IDs through Man-in-the-Middle Attack
Compromising Session IDs through Man-in-the-Browser Attack
Compromising Session IDs through Client-side Attacks
Compromising Session IDs through Client-side Attacks and Cross-site Script Attack
Compromising Session IDs through Cross-site Request Forgery Attack
Compromising Session IDs through Session Replay Attack and Session Fixation
Session Hijacking through Proxy Servers, CRIME Attack, and Forbidden Attack
Chapter 11.3: Network Level Session Hijacking
TCP/IP Hijacking
RST and Blind Hijacking.
UDP Hijacking and IP Spoofing
MiTM Attack through Forged ICMP and ARP Spoofing
Chapter 11.4: Session Hijacking Tools and Counterattacks
Session Hijacking Tools for Web and Mobile
Session Hijacking Detection Methods
Protecting Session Hijacking
Session Hijacking prevention methods for web developers and web users
Session Hijacking Detection Tools
Approaches for preventing Session Hijacking
Approaches exposable to Session Hijacking
Chapter 11.5: IPsec
IPsec Components
Advantages and Modes of IPsec
IPsec Architecture
IPsec Confidentiality and Authentication
Session Hijacking Prevention Tools and Penetration Testing
Module 12: IDS, Honeypots, and Firewalls
Chapter 12.1: Intrusion Detection System
How Intrusion Detection System Detects an Intrusion
Instructions of Intrusions
Different Kinds of Intrusion Detection Systems
Different Kinds of IDS Alerts
Chapter 12.2: Firewall
Firewall Architecture
Demilitarized Zone
Different Kinds of Firewalls
Firewall Technologies
Packet Filtering Firewall
Circuit-Level Gateway Firewall
Application-Level Firewall
Stateful Multilayer Inspection Firewall
Application Proxy
Virtual Private Network(VPN)
Network Address Translation
Firewall Restrictions
Chapter 12.3: Intrusion Detection Tools
Snort
TippingPoint and AlienVault
Intrusion Detection Tools for Web and Mobile
Chapter 12.4: Firewalls
ZoneAlarm Free Firewall and Firewall Analyzer
Firewalls for Web and Mobile
Chapter 12.5: Honeypots and Honeypot Tools
Different Kinds of Honeypots
KFSensor and SPECTER
Honeypot Tools for Web and Mobile
Chapter 12.5: IDS Evasion Methods
Insertion Attack
Evasion
Denial-of-Service Attack(DoS)
Obfuscating
False Positive Generation and Session Splicing
Fragmentation Attack
Session Splicing
Time-to-live Attacks
Overlapping Fragments
Invalid RST Packets
Polymorphic Shellcode
ASCII Shellcode
Desynchronization
Application-Layer Attacks
Other types of Evasion9966321077
Chapter 12.6: Firewall Evasion Techniques
Firewall Detection
IP Address Spoofing
Source Routing and Tiny Fragments
Evading Blocked Sites through IP Address and Anonymous Website surfing sites
Evading Firewall through Proxy server and ICMP Tunneling method
Evading Firewall through ACK Tunneling and HTTP Tunnelling method
Evading Firewall through External Systems and MITM Attack
Evading Firewall through the content
Evading WAF through XSS Attack
Chapter 12.7: IDS or Firewall Evading Tools
IDS or Firewall Evasion Tools
Packet Fragment Generator Tools
Chapter 12.8: Detecting Honeypots
Detecting and Defeating Honeypots
Send-Safe Honeypot Hunter - Honeypot Detection Tool
Chapter 12.9: IDS and Firewall Evasion Counterattacks
Defending IDS Evasion
Defending Firewall Evasion
Chapter 12.10: Penetration Testing
Firewall and IDS Penetration Testing
Module 13: Hacking Web Servers
Chapter 13.1: Web Servers Basics
Web Server operations
Open source Web Server Architecture
IIS Web Server Architecture
Web Server Security Issue
Why we compromise web servers?
Effect of Web Server Attacks
Chapter 13.2: Web Server Attacks
DoS and DDoS Attacks
DNS Server Hijacking
DNS Amplification Attack
Directory Traversal Attack
Man-in-the-Middle or Sniffing Attack
Phishing Attacks
Website Defacement
Web Server Misconfiguration
HTTP Response Splitting Attack
Web Cache Poisoning Attack
SSH Brute Force Attack
Web Server Password Cracking
Web Application Attacks
Chapter 13.3: Web Server Attack Methodology and Web Server Footprinting or Banner Grabbing
Collecting Information from Robots.txt file
Web Server Footprinting tools
Enumerating Web Server Information through Nmap
Chapter 13.4: Website Mirroring and Vulnerability Scanning
Finding the Default Credentials of Web Server
Finding the Default Content of Web Server
Finding Directory Listings of Web Server
Finding Exploitable Vulnerabilities
Chapter 13.5: Web Server Attack Tools
Metasploit
Web Server Attack Tools
Chapter 13.6: Counterattacks
Locate Web Servers in the Separate Secure Server Security Agent
Counterattacks
Detecting Web Server Hacking Attempts
Defending Web Server Attacks
Defending HTTP Response and Web Caching
Defending DNS Hijacking
Chapter 13.7: Patch Management
Patches and Hotfixes
Patch Management
Patch Installation
Patch Management Tools
Chapter 13.8: Web Server Security Tools
Web Application Security Scanners
Web Server Security Scanners
Web Server Security Tools
Chapter 13.9: Web Server Penetration Testing
Web Server Penetration Testing concepts
Web Server Penetration Testing Tool
Module 14: Hacking Web Applications
Chapter 14.1: Web App Concepts
Web Applications Basics
Web Application Architecture
Web2.0 Applications
Vulnerability Stack
Chapter 14.2: Web App Threats
OWASP Top 10 Application Security Risks - 2017
Other Web Application Threats
Chapter 14.3: Hacking Methodology
Web App Hacking Methodology
Footprint Web Infrastructure
Attack Web Servers
Analyze Web Applications
Bypass Client-side Controls
Attack Authentication Mechanism
Authorization Attack Schemes
Attack Access Controls
Attack Session Management Mechanism
Perform Injection or Input Validation Attacks
Attack Application Logic Flaws
Attack Database Connectivity
Attack Web App Client
Attack Web Services
Chapter 14.4: Web Application Hacking Tools and Countermeasures
Web Application Hacking Tools
Web Application Fuzz Testing
Source Code Review
Encoding Schemes
Defending Injection Attacks
Web Application Attack Counterattacks
Defending Web Application Attacks
Chapter 14.5: Web App Security Testing Tools and Web App Pen Testing
Web App Security Testing Tools
Web Application Firewall
Web Application Penetration Testing Framework
Module 15: SQL Injection
Chapter 15.1: SQL Injection Concepts
Define SQL Injection
SQL Injection and Server-side Technologies
Understanding HTTP POST Request and SQL Injection Query
Example of SQL Injection
Chapter 15.2: Types of SQL Injection and SQL Injection Methodology
Different Types of SQL Injection
SQL Injection Methodology
Chapter 15.3: SQL Injection Tools and Evasion Techniques
SQL Injection Tools for Web and Mobile
Evading IDS
Different Types of Signature Evasion Techniques
Chapter 15.4: Counterattacks
Defendinding SQL Injection Attacks
SQL Injection Detection Tools
Module 16: Hacking Wireless Networks
Chapter 16.1: Wireless Fundamentals
Wireless Terminologies
Wireless Networks and Standards
Service Set Identifier
Wi-Fi Authentication Modes
Wi-Fi Authentication Process through a Centralized Authentication
Different Types of Wireless Antenna
Chapter 16.2: Wireless Encryption
Different Types of Wireless Encryption
WEP vs WPA vs WPA2
WEP Concerns
Weak Initialization Vector(IV)
Chapter 16.3: Wireless Threats and Wireless Hacking Methodology
Wireless Threats
Wireless Hacking Methodology
Chapter 16.4: Wireless Hacking Tools
WEP/WPA Cracking Tools
WEP/WPA Cracking Tool for Mobile
Wi-Fi Sniffer
Wi-Fi Traffic Analyzer Tools
Additional Wireless Hacking Tools
Chapter 16.5: Bluetooth Hacking
Bluetooth Stack and Hacking
Bluetooth Threats and Hacking Tools
How do we BlueJack a Victim?
Chapter 16.6: Counterattacks and Wireless Security Tools
Wireless Security Layers
Defending WPA or WPA2 Cracking
Defending Krack Attacks
Detecting and Blocking Rogue AP
Defending Wireless Attacks
Defending Bluetooth Hacking
Wireless Intrusion Prevention System
Wireless IPS Deployment
Wi-Fi Security Auditing Tool
Wi-Fi Intrusion Prevention System
Wi-Fi Predictive Planning Tools
Wi-Fi Vulnerability Scanning Tools
Bluetooth Security Tool
Wi-Fi Security Tools for Mobile
Chapter 16.7: Wi-Fi Penetration Testing
Wi-Fi Penetration Testing Framework
Module 17: Hacking Mobile Platforms
Chapter 17.1: Mobile Platform Attack Vendors
Vulnerable Areas in Mobile Business Management
OWASP Top 10 Mobile Risks
Anatomy of the Mobile Attack
How a Hacker can profit from mobile
Mobile Attack Vectors and Mobile Platform Vulnerabilities
Security problems emerge from the App Stores
App sandboxing issues
Mobile spam and SMS Phishing Attack
Pairing Mobile Devices on Wi-Fi and Bluetooth Connection
Chapter 17.2: Hacking Android OS
Android OS and Rooting
Blocking Wi-Fi Access through NetCut
Hacking with zANTI
Hacking Networks through Network Spoofer
Launching DoS Attack through Low Orbit Ion Cannon(LOIC)
Performing Session Hijacking through DroidSheep
Hacking with Orbot Proxy
Android-based Sniffers and Trojans
Securing Android Devices
Android Security Tools
Android Vulnerability Scanner
Android Device Tracking Tools
Chapter 17.3: Hacking iOS
Apple and Jailbreaking iOS
iOS Trojans
Standards to Secure iOS Devices
IOS Device Tracking Tools
Device Security Tools
Chapter 17.4: Mobile Spyware and Mobile Device Management
Mobile Spyware: mSpy
Mobile Spywares
Mobile Device Management Solutions
Bring Your Own Device
Chapter 17.5: Mobile Security Guidelines and Tools
Standards for Mobile Platform Security
Standards for Administrator
SMS Phishing Counterattacks
Mobile Protection Tools
Mobile Anti-Spyware
Chapter 17.6: Mobile Penetration Testing
Android and iPhone Penetration Testing
Mobile Pentesting Toolkit
Module 18: IoT Hacking
Chapter 18.1: IoT Fundamentals
Define IoT
How IoT Works?
IoT Architecture
IoT Applications and Devices
IoT Technologies and Protocols
IoT Communication Models
IoT Challenges
Differentiate Threat and Opportunity
Chapter 18.2: IoT Attacks
IoT Security Problems
OWASP Best IoT Obstacles and Vulnerabilities
IoT Attack Surface Areas
IoT Threats
Hacking IoT Devices
IoT Attacks in various cases
Chapter 18.3: IoT Hacking Methodology and IoT Hacking Tools
IoT Hacking Methodology
Information Gathering Tools
Sniffing and Vulnerability Scanning Tools
Hacking Tools
Chapter 18.4: Counterattacks and IoT Penetration Testing
Defending IoT Hacking
Guidelines for IoT Device Manufacturing Companies
OWASP Best IoT Vulnerabilities Solutions
IoT Framework Security issues
IoT Security Tools
IoT Penetration Testing
Module 19: Cloud Computing
Chapter 19.1: Cloud Computing Basics
Introduction to Cloud Computing
Separating Responsibilities in Cloud
Cloud Deployment Models
NIST Cloud Computing Reference Architecture
Cloud Computing Advantages
Understanding Virtualisation
Chapter 19.2: Cloud Computing Threats and Attacks
Cloud Computing Threats
Service Hijacking through Network Sniffing
Session Hijacking through XSS Attack and Session Riding
DNS(Domain Name System) Attacks
Side-Channel Attacks or Cross-guest VM Breaches
SQL Injection Attacks
Cryptanalysis and Wrapping Attacks
Denial-of-Service(Dos) Attacks or Distributed Denial-of-Services Attacks
Man-in-the-Cloud Attack
Chapter 19.3: Cloud Security and Cloud Security Tools
Cloud Security Control Layers
Cloud Security is the responsibility of Cloud Provider
Cloud Computing Security Issues
Placement of Security Controls in Cloud
Best Methods for Securing Cloud
NIST Recommendations for Cloud Security
Provider Cloud Security Compliance Checklist
Cloud Security Tools
Chapter 19.4: Cloud Penetration Testing
Define Cloud Penetration Testing
Key Issues for the Cloud Penetration Testing
Suggestions for Cloud Testing
Module 20: Cryptography
Chapter 20.1: Cryptography Basics and Encryption Algorithms
Government Access to Keys
Ciphers
Data Encryption Standard
Advanced Encryption Standard
RC4, RC5, and RC6 Algorithms
Twofish
DSA and Related Signature Schemas
Rivest Shamir Adleman(RSA)
Diffie-Hellman
Message Digest Functions
Chapter 20.2: Cryptography Tools
MD5 Hash Calculators
Hash Calculators for Mobile
Cryptography Tools for Web and Mobile
Chapter 20.3: Public Key Infrastructure and Email Encryption
Public Key Infrastructure
Digital Signature
Secure Sockets Layer(SSL)
Transport Layer Security(TLS)
Cryptography Toolkit
Pretty Good Privacy(PGP)
Chapter 20.4: Disk Encryption and Cryptanalysis
Disk Encryption Tools
Cryptanalysis Methods
Code Breaking Methodologies
Cryptography Attacks
Cryptanalysis Tools
Online MD5 Encryption Tools
Chapter 20.5: Counterattacks
Defending Cryptographic Attacks
Practice & Interview Questions
Articles
Popular Articles
UGC Guidelines to Pursue Online Courses
Updated On
04 Jul, 2025
IGNOU Online Courses Approved by UGC
Updated On
03 Jul, 2025
Top 10 Indian Universities Offering Online Degrees
Updated On
09 Jun, 2025
150+ UGC Approved Online Degree Courses by Top ...
Updated On
03 Jun, 2025
Best Programming Languages to Learn in 2025
Updated On
09 May, 2025
Top 10 Online Healthcare and Hospital Managemen...
Updated On
04 Apr, 2025
Top 12 Certification Courses Offered by IIT Bombay
Updated On
24 Jan, 2025
The Scope of Artificial Intelligence in India
Updated On
09 Jan, 2025
Reasons to Enroll for an Online Content Writing...
Updated On
29 Feb, 2024
Top 10 Online Animation Certificate Courses for...
Updated On
27 Feb, 2024
Latest Articles
Top 7 Online Ethical Hacking Certificate Courses
Updated On
21 Mar, 2025
Top Ethical Hacking Interview Questions to Know
Updated On
06 Apr, 2024
20 Online Courses to Become a High-Paid Ethical Hacker
Updated On
04 Mar, 2024
Top Trending Ethical Hacking Tools To Master Right Now
Updated On
27 Sep, 2023
Trending Courses
Popular Courses
Popular Platforms
Learn more about the Courses
Providers
Providers
Providers
Collaborators
Medium of Instructions
Mode of Learning
Mode of Study
Mode of Delivery
Certificate Providing Authority
Download Brochure
Thank You!
Brochure has been downloaded.