Advance Ethical Hacking Course in Lahore | Cyber Security Training Course in Lahore

ETHICAL HACKING COURSE OUTLINE
This Course is designed to get your hands quickly and professionally on to the world of Ethical
Hacker’s, by the end of this 8 Weeks long course you should have clear understandings of Complete
Ethical Hacking.
Following Will be covered in this Course:
1. Introduction to Ethical Hacking
• Internet is integral part of Business and Personal
• Information Security Overview
• Information Security Threats and Attack Vectors
• Hacking Concepts, Types & Phases
• Ethical Hacking Concepts & Scope
• Concept of Legal and illegal hacking
• Information Security Controls
• Advance Research topics and follow up
• Class Task 1
2. Footprinting and Reconnaissance
• Footprinting Concepts
• Footprinting Methodology
• Footprinting Tools
• Advance Footprinting Techniques
• Lab 1
• Footprinting Countermeasures
• Footprinting Penetrating testing
• Lab 2
• Class Task 2

3. Scanning Networks
Following Will be covered in this Course:
• Overview of Networking Scanning
• CEH Scanning Methodology & Advance Network Scanning
• Lab 3
• Advance System I Host Scanning
• Lab 4
• Advance Website Scanning
• Lab 5
• Deep scanning logic
• Lab 6
• Banner Grabbing Techniques and Defence
• Categorizing information
• Scanning Pen Testing Design
• Class Task 3
4. Enumeration
• Enumeration Concepts & NetBIOS Enumeration
• SNMP Enumeration
• Lab 7
• LDAP Enumeration & N TP Enumeration
• SMTP Enumeration
• Lab 8
• Advance Enumeration Methodologies
• Enumeration Countermeasures
• SMB Enumeration Countermeasures
• Lab 9
• Enumeration Pen Testing
• Class Task 4

Following Will be covered in this Course:
5. System Hacking
• Information at Hand before System Hacking Stage
• System Hacking: Goals & CEH Hacking Methodology (CHM)
• Lab 10
• Data Recovery Techniques
• Lab 11
• System Password Recovery Techniques
• Lab 12
• CEH System Hacking Steps
• Lab 13
• Log Management and Analysis
• Lab 14
• Penetrating Testing
• Class Task 5

6. Malware Threats
• Malware Concepts & Malware Types and Branches
• Lab 15
• Malware Methodology & Malware Tools
• Lab 16
• Framework Design and Deployment
• Lab 17
• Lab 18
• Malware Countermeasures and Defence Strategies
• Lab 19
• Lab 20

Following Will be covered in this Course:
• Lab 21
• Malware Penetrating testing
• Class Task 6
7. Sniffing
• Sniffing Concepts & MAC Attacks and Defence
• Lab 22
• Spoofing Techniques
• Lab 23
• Sniffing Tools
• Sniffing Tool: Wireshark & Sniffing Tool: Cain & Able
• Lab 24
• Lab 25
• Lab 26
• Advance Countermeasures
• Sniffing Detection Techniques & Sniffing Reports
• Class Task 7
8. Social Engineering
• Social Engineering Concepts & Social Engineering Techniques
• Lab 27
• Impersonation on Social Networking Sites
• Lab 28
• Social Engineering Countermeasures & Defence
• Class Task 8

Following Will be covered in this Course:
9. Denial-of-Service Attack
• DoS/DDoS Advance Concepts
• DoS/DDoS Analysis Tools and Methodologies
• Lab 29
• DoS/DDoS Attack Techniques & Botnets Techniques and Usage
• Lab 31
• DoS/DDoS Attack Tools
• Lab 32
• Class Task 9
10. Session Hijacking
• Attack techniques 2019 & Session Hijacking Concepts
• Application Level Session Hijacking
• Lab 33
• Network-Level Session Hijacking & Session Hijacking Tools
• Lab 34
• Countermeasures
• Class Task 10
11. Hacking Webservers
• Webserver Market Shares & Webserver Concepts
• Webserver Attacks
• Lab 35
• Attack Methodology

Following Will be covered in this Course:
• Webserver Attack Tools
• Lab 36
• Countermeasures & Webserver Security Defence and Tools
• Class Task 11
12. Hacking Web Applications
• Web Application Attack Report
• Variety of Hacking Actions with in Web App Attacks Pattern
• Web App Concepts & Web App Threats
• Web App Hacking Methodology
• Attack Web Servers
• Lab 37
• Analyze Web Applications Vulnerabilities
• Lab 38
• Attack Authentication Mechanism & Perform Injection Attacks
• Lab 39
• Injection Attacks/lnput Validation Attacks
• Lab 40
• Attack Data Connectivity
• Attack Web App Client & Attack Web Services
• Web Application Hacking Tools
• Lab 41
• Web Application Security Tools
• Web Application Firewall
• Lab 42
• Web Application Pen Testing Framework

Following Will be covered in this Course:
• Class Task 12
13. SQL Injection
• SQL Injection Concepts & Types of SQL Injection
• SQL Injection Methodology & SQL Injection Tools
• Lab 43
• Lab 44
• Lab 45
• Countermeasures
• Class Task 13

14. Hacking Wireless Networks
• Are you protected from Hackers on Public Wi-Fi?
• Wi-Fi Statistics & Wireless Concepts
• How to Defend Against WPA/WPA2 Cracking
• Lab 46
• Wireless Threats & Wireless Hacking Methodology
• Lab 47
• What is Spectrum Analysis?
• Wi-Fi Packet Sniffers & Launch Wireless Attacks
• Lab 48
• How to Launch MAC Spoofing Attack
• Denial of Service: De-authentication and Dis-association Attacks
• Lab 49
• Man-in-the-Middle Attack

Following Will be covered in this Course:
• Lab 50
• Evil Twin & Wireless Hacking Tools
• Lab 51
• Bluetooth Hacking & Countermeasures
• Class Task 14

15. Hacking Mobile Platforms
• Mobile Platform Attack Vectors & Hacking Android OS
• Lab 52
• Hacking iOS
• Hacking Windows Phone OS & Hacking Blackberry
• Mobile Device Management
• Lab 53
• Mobile Security Guidelines and Tools
• Lab 54
• Class Task 15

16. Evading IDS, Firewalls, and Honeypots
• IDS, Firewall and Honeypot Concepts
• IDS, Firewall and Honeypot System
• Lab 55
• Evading IDS & Evading Firewalls
• Lab 56
• Detecting Honeypots
• Lab 57

Following Will be covered in this Course:
• Class Task 16

17. Cloud Computing
• Introduction to Cloud Computing
• Cloud Computing Threats
• Cloud Computing Attacks
• Lab 58
• Cloud Security
• Cloud Security Tools
• Lab 59
• Cloud penetrating Testing
• Class Task 17

18. Cryptography
• Cryptography Concepts
• Encryption Algorithms
• Cryptography Tools
• Lab 60
• Email Encryption
• Disk Encryption
• Cryptography Attacks
• Lab 61
• Cryptanalysis Tools
• Class Task 18

This content was originally published here.

Share this post

Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email