Ethical Hacking & Penetration

Master Program1034 Ratings
  • Live interaction with Industry leadershipIncludes live Master Classes and Ask me anything sessions
  • 100+ hours of live interactive learningLive Online classes by industry experts
  • With real time projectsBuilt on datasets of various scenarios & real time problems
  • ITlearn360 JobAssistGet noticed by the top hiring companies

Learning Path

  • Course 1

    Security Awareness Training

    Course curriculum

    Module 1: Security Awareness Training

    • 1.1  Introduction

    Module 2: Phishing

    • 2.1  Introduction to Phishing
    • 2.2  Suspicious Links

    Module 3: Social Engineering

    • 3.1  Introduction to Social Engineering
    • 3.2  Preventing Social Engineering

    Module 4: Data Leakage

    • 4.1  Data Leakage
    • 4.2  Preventing Data Leakage

    Module 5: Passwords

    • 5.1  Passwords
    • 5.2  Creating Strong Passwords
    • 5.3  Common Questions and Answers

    Module 6: Safe Browsing

    • 6.1  Safe Browsing
    • 6.2  Safe Browsing on Public Wi-Fi

    Module 7: Personal Devices

    Module 8: General Security Tips

    • 8.1  Ransomware
    • 8.2  Additional Tips
  • Course 2

    Licensed Penetration Tester

    Course curriculum

    Module 1: Introduction to Pen Testing

    • 1.1  The need for Pen Testing
    • 1.2  Methodology of Pen Testing
    • 1.3  Ethics and Compliance to Legal Systems

    Module 2: Pen Testing Engagement Lifecycle

    • 2.1  Pen Testing Scope and Boundaries

    Module 3: The Basics

    • 3.1  Networking Concepts
    • 3.2  Operating System Security
    • 3.3  Application Layer Protocols
    • 3.4  Cryptography Concepts Review
    • 3.5  Wireless and Database Concepts Review

    Module 4: Information Gathering & Social Engineering

    • 4.1  Creating USB Payloads for Social Engineering Attacks
    • 4.2  Gathering DNS Registration Information
    • 4.3  Gathering Router
    • 4.4   Firewall and IPS Information
    • 4.5  Gathering Email Addresses from Public and Social Websites
    • 4.6  Reading Metadata of Files Revealing Target Information
    • 4.7  Hiding Attacks Using Onion Routing Network

    Module 5: Target Discovery Fingerprinting & Enumeration

    • 5.1  Discovering the Operating System Details
    • 5.2  Port and Services Discovery using NMAP

    Module 6: Vulnerability Mapping

    • 6.1  Understanding Vulnerability Taxonomy
    • 6.2  Discovering and Analyzing Weaknesses

    Module 7: Target Exploitation & Privilege Escalation

    • 7.1  Escalation for Windows and Linux
    • 7.2  Choosing Attack Vectors
    • 7.3  Performing Local and Remote Attacks
    • 7.4  Gathering and Cracking Password Hashes using Mimikatz and John the Ripper
    • 7.5  Attacking a Target through a Compromised Target (Pivoting)
    • 7.6  Creating Man In The Middle Attacks through Spoofing
    • 7.7  Sniffing Authentication Packets Revealing Passwords
    • 7.8  Cracking Default Passwords with Password Lists and Rainbow Tables

    Module 8: Maintaining Access & Covering Tracks

    • 8.1  Creating Metasploit Backdoor Payloads
    • 8.2  Antivirus
    • 8.3   Firewall
    • 8.4   and IPS Evasion Techniques

    Module 9: Web Pen Testing & Database Injection

    • 9.1  Bypassing Authentication using Cross Site Scripting
    • 9.2  Revealing User Accounts and Passwords through Database Injection

    Module 10: Documentation, Reporting & Presentation

    • 10.1  Writing Pen Testing Reports