- eLearning through LMS
- Online Exam & Certification
- 40 Hours Virtual Classes
Course Duration : 1 Month
Who Can Pursue this : Any 10+2 or Equivalent
Hacking has gone from an obscure term to something that appears in the daily news. In this course we’ll get started with what is hacking and understand some of the differences between “white” hat hackers and “black” or “grey” hat hackers. Ethical hackers work as an information security expert. They try to break the security of a computer system, network, or applications.
Fees : INR 40,000 +GST
This Ethical Hacking program will cover at a high level what are some of the essential tools a hacker needs to know about and be proficient with as well as the credentials of a hacker and what you can expect when becoming a Certified Ethical Hacker (CEH). We’ll dig deeper into the primary operating systems used for hacking: linux and windows. Automating tasks is critical to your job as a hacker and knowledge of shell scripts is key. Learn how to identify threats both external and internal. Perhaps one of the employees of the business uses a very weak password and this is a security threat that a dictionary attack tool can rapidly find. It then covers how to gain information or “footprinting” on a target of ethical hacking. It shows how to scan and also to mitigate scans to acquire information about weak points and then explains diagramming your system from a hacking perspective. There are many different types of Malware from trojans and worms to viruses and backdoors. Learning about how each threat is different is key and about how to mitigate it. Examples will be shown with Wireshark and how to interact with Packets. Also the human element of Ethical Hacking will be covered. Perhaps a company is very good in network security but lacking in physical security. This is an area that social engineering can come into play. How do you case an establishment and look for week points in the human element? And also how can you attempt to mitigate these threats.
|Module 01||Module 02|
|1. Introduction||1. App Level Session Hijacking||31. Wireless Bluetooth Hacking|
|2. Hacker Credentials||2. Network Level Hijacking||32. Wireless Countermeasures|
|3. Hacker Credentials Part 2||3. Session Hijacking Tools||33. IDS, Firewalls, and Honeypots|
|4. Being a Hacker||4. Session Hijack Countermeasures||34. Evading IDS|
|5. Terminology||5. Session Hijack Pentest||35. Evading Firewalls|
|6. Tools||6. Web Server Concepts||36. Evading Firewall Tools|
|7. Footprinting||7. Web Server Attacks||37. Detecting Honeypots|
|8. Footprint Tools and CM||8. Web Server Attack Methodology||38. IDS Evasion Countermeasures|
|9. Intro to Linux||9. Web Server Attack Tools||39. IDS Penetration Testing|
|10. Intro to Linux 2||10. Web Server Countermeasures||40. Intro to Cloud Computing|
|11. Intro to Linux 3||11. Web Server Patch Management||41. Cloud Computing Threats|
|12. Intro to Windows||12. Web Server Security Tools||42. Cloud Computing Attacks|
|13. Threats||13. Web Server Penetration Testing||43. Cloud Security|
|14. Scanning||14. Web Application Concepts||44. Cloud Security Tools|
|15. Scanning Demo||15. Web Application Threats||45. Cloud Penetration Testing|
|16. Enumeration||16. Web App Hacking Methodology||46. 2014: The Year of Encryption|
|17. Enumeration Demo||17. Web Application Hacking Tools||47. Case Study: Heartbleed|
|18. System Hacking||18. Web App Countermeasures||48. Case Study: POODLEbleed|
|19. System Hacking Demos||19. Web App Security Tools||49. Cryptography Concepts|
|20. Trojans and Backdoors||20. Web Application Pen Testing||50. Encryption Algorithms|
|21. Trojans and Backdoors Demo||21. SQL Injection Concepts||51. Security Tools|
|22. Viruses||22. SQL Injection Types||52. Public Key Infrastructure|
|23. Viruses Demo||23. SQLi Attack Methodology||53. Email Encryption|
|24. Worms||24. SQLi Tools||54. Disk Encryption|
|25. Worms Demo||25. SQLi Evasion Techniques||55. Cryptography Attacks|
|26. Sniffing||26. SQLi Countermeasures||56.Cryptography Tools|
|27. Social Engineering||27. Wireless Networking Concepts|
|28. Social Engineering Techniques||28. Wireless Encryption|
|29. Tech Attacks Countermeasures||29. Wireless Threats|
|30. DOS Attacks||30. Wireless Hacking Methodology|
eLearning + Virtual class (Instructor-led) + Certification.
40 Hours of Virtual class.
EH | ASSESSMENT
- Exam Title
Certified Ethical Hacking (Assessment)
- Exam Code
108-01 (JA+ Exam)
- Number of Questions
- Test Format
- Instructor led Training
- Guaranteed Guest Lecture sessions by Industry Experts
- One to One Individual Care through Video Conferencing
- 9 to 7 Student helpdesk support system
- Login facility through Web & Mobile
- Complementary – Spoken English & Personality Development Modules
- 6 Months access to the course ONLINE
Frequently Asked Questions (FAQs)
Who should join the Course?
10+2 or equivalent
What certificates will I receive for this course?
Jobs Academy Certification will be provided
Will there be sessions on Soft Skills and Communication?
Obviously! There will be fruitful sessions on Soft Skills and communication including body language.
Is there any option to get enough opportunities to interact with Industry Experts?
Absolutely, there will be ample sessions conducted by Industry Experts at regular intervals
If I get stuck during the course how should I contact?
In that case you can always contact the expert who will be available to satisfy your query. There will be a calling window.
Helpline Number is : +91-8585858746