CYBER SECURITY/ ethical hacking
Become a Cyber / ethical hackering expert
3 Months course with 1 Year Support
To be mutually decided with Students
Online & On Campus
40,000 PKR / 25,000 PKR
- 2 months of details Sessions
- The Trainer Support (Face to Face & Online)
- Free retake within 6 months
- Trainer support after training
- Three month internship
- Upto date industrial experience
BECOME Cyber Security/ Ethical Hacking Expert – We’RE READY TO HELP YOU!
Course Module Breakdown
Here's something we have to share with you...
This is the complete overview of course
1
Cyber Security Fundamentals
- Motivational Lecture
- Course Introduction
- Success stories
- Job market
- Course Application in Industry
- Institute/work ethics
- Introduction to Cybersecurity
- Objectives / Roles
- Why is Cyber security Important?
- What is a Hacker?
- Describe the elements of information security
- Lab Buildup (Installation of VMware Workstation, EVE-NG, Kali-Linux)
- Explain information security threats and attack vectors
- Describe the hacking concepts, types, and phases
- Understand the information security controls (information defense-in-depth, policies, procedures, awareness and risk management)
- Understand the penetration testing process
2
Information Gathering, Foot printing
- Basic Concept of Foot printing
- OS, Application, Server, Hardware, Version, information gathering
- Perform scanning to check for live system and open ports
- Subdomains, Email, DNS information gathering
3
Reconnaissance and Enumeration
- Foot printing using Search Engines
- Network Foot printing
- Concepts of Enumeration
- Introduction to Enumeration tools
- NetBIOS and SNMP Enumeration
- NTP, DNS and FTP Enumeration
4
Vulnerability Assessment
- Introduction to Vulnerability Assessment Tools
- Use Nikto for Vulnerability Scanning
- Vulnerability research using vulnerability scoring systems and databases
- Lynis for System Vulnerability Scanning
- Vulnerability Assessment Reports
- Create a Formatted Report with Nikto
5
Operating System (Linux) Fundamentals
- Introduction is Linux Distributions
- Installing Kali Linux and CentOS
- Basic Shell Commands of Linux
- Managing Users, Groups and Partitions
- File Ownership
- Working with the Bash Shell & Shell Scripts
- Managing Files and their permissions.
- Installation of Apache Server on Linux
- FTP/SMB/DHCP/DNS/Apache/Mail Servers on Linux
6
System Hacking & Manipulation.
- System Hacking Concepts
- Performing Online Password Attacks
- Gain Access of remote system using Armitage
- Hide data using steganography