Android Application Development RaipurTricks

Ethical Hacking Training is the pinnacle of the most desired forensic training for any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but being an ethical one is a difficult task!

RaipurTricks is another most famous course providing hacking workshops & trainings both in basic as well as advanced level. Techniques used by hackers and information security professionals are alike to break into an organization but differ in the context.

Android Application Development RaipurTricks
Android Application Development RaipurTricks

As we put it, “Every person has a Hacker in itself”. This course will immerse you into the Hacker Mindset & will let your curiosity attain the depth of knowledge…, making you able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

Ethical Hacking Syllabus

Concept of Ethical Hacking

  • What Is Hacking
  • Types of hacker
  • Why hackers hack?
  • Preventions from hacker
  • Steps Performed by hackers
  • Working of an Ethical hacker
  • Information Gathering and Scanning

  • Why Information gathering?
  • Whois lookup
  • Reverse IP mapping
  • Information Gathering Using Search Engine
  • Email Hacking

  • How Email Works?
  • Email service protocols
  • Email spoofing
  • PHP Mail sending script
  • Email Spamming
  • Phishing
  • Prevention from phishing
  • Email Tracing
  • Keystroke loggers
  • Securing Your Email account
  • Windows Hacking and Security
  • Security Architecture of Windows
  • Windows user account Architecture
  • Cracking Windows User Account password
  • Windows User Account Attack
  • Counter Measures of Windows Attack
  • To hide a file behind a image
  • To run net user in Vista and Windows 7
  • Brute Force Attack
  • Rainbow table attack
  • Counter Measures for Windows Attack
  • Trojans in Brief

  • Knowing the Trojan
  • Different Types of Trojans
  • Components of Trojans
  • Mode of Transmission for Trojans
  • Detection and Removal of Trojans
  • Countermeasures for Trojan attacks
  • Mobile Hacking – SMS & Call forging

  • What Does It Involve
  • Call Spoofing / Forging
  • SMS Forging
  • Bluesnarfing
  • Attacks on web servers and Security

  • Introduction to Web Servers
  • The Basic Process: How Web servers work
  • Attacks on Web servers
  • Web Ripping
  • Google Hacking
  • Protecting Your Files from Google
  • Directory Traversal Attack
  • Database Servers
  • Login Process on the websites
  • SQL injection
  • PHP Injection: Placing PHP backdoors
  • Directory Access controls
  • How Attackers Hide Them While Attacking
  • Types of Proxy Servers
  • Hacking Wordpress, Drupal & Joomla
  • Wireless hacking

  • Wireless Standards
  • Services provided by Wireless Networks
  • MAC address filtering
  • WEP key encryption
  • Wireless attacks
  • MAC spoofing
  • WEP cracking
  • Bug Bounty (Earning from Hacking)

  • How to earn from Hacking?
  • What is Bug Bounty.
  • Bug Bounty Platforms
  • How much can we earn from Bug Bounty.
  • How to participate on Bug Bounty Programs
  • Working with Burp Suite
  • Web Application Vulnerabilities
  • Injections
  • Broken Authentication and Session management
  • Cross Site Scripting
  • Type of Cross Site Scripting
  • Insecure Direct Object Reference
  • Security Misconfiguration
  • Sensitive Data Exposure
  • Missing Function Level Access Control
  • Using Components with Knows Vulnerabilities
  • Invalidated Redirects and Forwards

  • Duration - 45 Days

    Fee - Rs.9999/-

    To join, Call Us on +917067440002

    *Certificate will be provided by RaipurTricks (ISO 9001:2008) JAS-ANZ