Android Application Development RaipurTricks

Ethical Hacking Training is the pinnacle of the most desired forensic training for any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but being an ethical one is a difficult task!

RaipurTricks is another most famous course providing hacking workshops & trainings both in basic as well as advanced level. Techniques used by hackers and information security professionals are alike to break into an organization but differ in the context.

Android Application Development RaipurTricks
Android Application Development RaipurTricks

As we put it, “Every person has a Hacker in itself”. This course will immerse you into the Hacker Mindset & will let your curiosity attain the depth of knowledge…, making you able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

Ethical Hacking Syllabus for Vocational Training

Concept of Ethical Hacking

  • What Is Hacking
  • Types of hacker
  • Why hackers hack?
  • Preventions from hacker
  • Steps Performed by hackers
  • Working of an Ethical hacker
  • Information Gathering and Scanning

  • Why Information gathering?
  • Whois lookup
  • Reverse IP mapping
  • Information Gathering Using Search Engine
  • Email Hacking

  • How Email Works?
  • Email service protocols
  • Email spoofing
  • PHP Mail sending script
  • Email Spamming
  • Phishing
  • Prevention from phishing
  • Email Tracing
  • Keystroke loggers
  • Securing Your Email account
  • Windows Hacking and Security
  • Security Architecture of Windows
  • Windows user account Architecture
  • Cracking Windows User Account password
  • Windows User Account Attack
  • Counter Measures of Windows Attack
  • To hide a file behind a image
  • To run net user in Vista and Windows 7
  • Brute Force Attack
  • Rainbow table attack
  • Counter Measures for Windows Attack
  • Attacks on web servers and Security

  • Introduction to Web Servers
  • The Basic Process: How Web servers work
  • Attacks on Web servers
  • Web Ripping
  • Google Hacking
  • Protecting Your Files from Google
  • Directory Traversal Attack
  • Database Servers
  • Login Process on the websites
  • SQL injection
  • PHP Injection: Placing PHP backdoors
  • Directory Access controls
  • How Attackers Hide Them While Attacking
  • Types of Proxy Servers
  • Hacking Wordpress, Drupal & Joomla
  • Bug Bounty (Earning from Hacking)

  • How to earn from Hacking?
  • What is Bug Bounty.
  • Bug Bounty Platforms
  • How much can we earn from Bug Bounty.
  • How to participate on Bug Bounty Programs
  • Working with Burp Suite
  • Web Application Vulnerabilities
  • Injections
  • Broken Authentication and Session management
  • Cross Site Scripting
  • Type of Cross Site Scripting
  • Insecure Direct Object Reference
  • Security Misconfiguration
  • Sensitive Data Exposure
  • Missing Function Level Access Control
  • Using Components with Knows Vulnerabilities
  • Invalidated Redirects and Forwards

  • Duration - 30 Days

    *Certificate will be provided by RaipurTricks (ISO 9001:2008) JAS-ANZ

    Register Now