Mountains

Ethical Hacking Course

CORPORATE TRAINER

Course Duration

3 month

📘 Module 1: Introduction to Ethical Hacking

  • What is Hacking & Ethical Hacking
  • Types of Hackers (White Hat, Black Hat, Grey Hat)
  • Phases of Hacking
  • Legal & Ethical Concepts
  • Real-world Cyber Attacks Case Studies

💻 Module 2: Computer & Networking Basics

  • Basics of Computer Systems
  • Types of Networks (LAN, WAN, MAN)
  • OSI Model & TCP/IP Model
  • IP Addressing & Subnetting
  • Common Network Protocols (HTTP, FTP, DNS, SMTP)

🐧 Module 3: Operating Systems (Windows & Linux)

  • Introduction to Linux (Kali Linux)
  • Installation of Kali Linux (VirtualBox)
  • Linux Commands (Basic to Intermediate)
  • File System & Permissions
  • Windows Basics for Hackers

🌐 Module 4: Footprinting & Reconnaissance

  • Information Gathering Techniques
  • WHOIS, DNS Lookup
  • Google Dorking
  • Social Engineering Basics
  • Tools: Maltego, Recon-ng

🔎 Module 5: Scanning Networks

  • Network Scanning Concepts
  • Port Scanning Techniques
  • Vulnerability Scanning
  • Tools: Nmap, Zenmap, Nessus

🔐 Module 6: System Hacking

  • Password Cracking Techniques
  • Brute Force & Dictionary Attacks
  • Keyloggers & Malware Basics
  • Privilege Escalation
  • Tools: Hydra, John the Ripper

🦠 Module 7: Malware & Threats

  • Types of Malware (Virus, Worm, Trojan, Ransomware)
  • How Malware Works
  • Basic Malware Analysis
  • Prevention Techniques

🌍 Module 8: Web Application Hacking

  • Basics of Websites & Web Servers
  • OWASP Top 10 Vulnerabilities
  • SQL Injection
  • Cross-Site Scripting (XSS)
  • Tools: Burp Suite, SQLmap

📶 Module 9: Wireless Network Hacking

  • Wi-Fi Security Concepts
  • WPA/WPA2 Cracking Basics
  • Evil Twin Attack
  • Tools: Aircrack-ng

🛑 Module 10: Social Engineering

  • Phishing Attacks
  • Email Spoofing
  • Human Psychology in Hacking
  • Awareness & Prevention

🔥 Module 11: Cryptography

  • Basics of Encryption & Decryption
  • Hashing Algorithms
  • Symmetric vs Asymmetric Encryption
  • SSL/TLS Basics

🛡️ Module 12: Security & Defense

  • Firewalls & IDS/IPS
  • Antivirus & Endpoint Security
  • Secure Coding Basics
  • Best Security Practices

🧪 Module 13: Hands-on Practical Labs

  • Real-world attack simulations
  • Capture The Flag (CTF) Challenges
  • Vulnerability Assessment Practice
  • Live Lab Environment Practice

🎯 Module 14: Final Project

  • Complete Security Audit of a System/Website
  • Report Preparation
  • Presentation

🏆 Certification

  • Course Completion Certificate
  • Practical Assessment

Course Features

  • Duration 3 month
  • Skill Beginner
  • Category Ethical Hacking