Module 1:
Concepts and Theory
- Cyber Ethics and Law & Introduction
- Networking Concepts
- Google Hacking Database
- Information Gathering1
- Footprinting using Google
- Website footprinting
- Email Tracking and Footprinting
- Checking Traffic of Website
Module 2:
LAB SETUP
- VIRTUAL LAB CREATION
- Installation of VMWARE
- Installation of Kali Linux OS and Configuration
- FOOTPRINTING AND RECONNAISSANCE
- Information Gathering2
- Network Scanning and FOOTPRINTING1
- Network Scanning and FOOTPRINTING2
- NETWORK SCANNING USING N MAP
Module 3:
Pentesting on Router
- ROUTER PENTESTING
- Theory and Lab Setup
- Practical Scanning, Enumeration, and Exploiting Router in Multiple Ways
Module 4:
Network Pentesting
- NETWORK PENTESTING
- Lab setup with Windows
- Windows EndPointsPentesting
- Theory and Practical
- BufferOverflow (Theory and Exploitation)
Module 5:
Network Pentesting
- Software Misconfiguration
- RDP Service Exploitation
- Social Engineering Begins(Theory and Practical)
- ATTACK WEAKEST LINK HUMAN
- Introduction to Metasploit
- How Firewall works?
- Exploit it
Module 6:
Network Pentesting& Cyber Security
- Challenge: Level 1: Bypass The Firewall of Windows
- Level 2: Increase The Security
- (BLOCK PORT) and Prevent Hacking
- Break the Updated and Advance above Blocked PORT Security Also.
Module 7:
Social Engineering & Challenges
- Level 3:Increase the Security (BLOCK RANGE OF PORTS) this is advance level security
- Break the LEVEL 3 challenge also
- Level 4: Most advanced security (Block All Ports)
- Break It
- Cyber Crime Study
- Analyse the Attacks
- How NASA was hacked?
- Gary Mckinnon NASA Hack Case Study
- Challenge: Do the same attack in your own virtual lab
- System Hacking Using Social Engineering
Module 8:
METASPOILT-FRAMEWORK
Challenge Continues
- Do the same attack in your own virtual lab
- Celebration of Passing All Challenge
- How Antivirus Works?
- Bypass TOP BRANDED Antiviruses
- INFORMATION GATHERING
- BASIC EXPLOITATION
- Antivirus
- Bypass Antivirus
- Beat Antivirus using Python
- Escalate Privilege
- Post Exploitation with UAC Bypass
- Dump Hashes &Mimikatz
- Remote Network Monitoring
- Windows Sessions, Stations and Desktops
- Keyboard, Mouse Hacking
- Impersonation
- Temper the PAC
- Block Websites using PAC
TEAMVIEWER IS DANGEROUS
GOOGLE CHROME CAN LEAD TO HACK THE SYSTEM
Module 9:
Miscellaneous
- Hijack Session Between CtrlC & Ctrl V
- Man In The Middle Attack in Multiple Ways
- CCTV Hacking
- Webcam Hacking And Live Streaming
- HACK Microphone
- DOS ATTACK LIKE PRO AND Network Monitor
Module 10:
WEBAPP PENTESTING
- HACK Social Media Accounts using Phising Attacks
- SQL Injection
- XSS Attack
- JS AND HTML FUN FOR PENTESTERS
- SERVER HACKING
Module 11: REAL LIFE HACKING
PROJECTS & HACKING TOOLS
Webskitters Academy is a leading trustworthy online IT training institute in India. We have provided training and helped more than 3000 students to establish their career in the IT industry. We have several highly-popular online IT training courses, the Ethical Hacking and Cyber Security Online Course, being the most preferred one. Our students get their training from the industry experts, and also get the opportunity to work on live projects, hence understanding the market intricacies. We prepare them for the industry and also help them to bag a suitable job, right after the course completion.