Charges for the Training is NON REFUNDABLE, NON TRANSFERABLE, NON-EXTENDABLE.
Timings & Dates may vary.
In case of cancellation of Training from our side, the participants of the cancelled Training will be given an option to be upgraded to another Training. If the offer is denied by them, only then will they be considered for a refund.
If In Any Case training is cancelled by Organizers due to any reason, we will refund the fee after deducting Bank Changes.
If you are not satisfied with our teaching,then drop us email at info@smartcodingg.com
Verification>>Approval>>Bank Credit through the same mode of payment.
Cash refund is NOT possible under any circumstance.
We are not responsible for any software failing to run/install on the participant's laptop owing to different configurations in laptops.
If you are not satisfied with the quality of services provided during the Training, drop us a mail @ info@alvinitsolutions.in
Ethical Hacking - Cyber Security provides basic and advanced concepts of Ethical Hacking Cyber Security. Our Ethical Hacking Cyber Security is developed for beginners and professionals.
Ethical hacking - Cyber Security covers all the aspects associated with hacking. Firstly, we will learn how to install the needed software. After this, we will learn the 4 type of penetration testing section which is network hacking, gaining access, post exploitation, website hacking.
In network hacking section, we will learn how networks work, how to crack Wi-Fi keys and gain access the Wi-Fi networks. In Gaining access section, we will learn how to gain access to the servers and personal computers. In the post-exploitation section, we will learn what can we do with the access that we gained in the previous section. So we learn how to interact with the file system, how to execute a system command, how to open the webcam. In the website hacking section, we will learn how the website works, how to gather comprehensive information about website. In the end, we will learn how to secure our system from the discussed attacks.
What is Ethical Hacking
Environmental setup
Network Penetration
Network Penetration Testing
Basic of Network
Pre-connection Attacks
Pre-connection Attacks
Wireless Interface in Monitor mode
About airodump-ng
Run airodump-ng
Deauthenticate
Network Device Access
Gaining Access
WEP Introduction
WEP Cracking
Fake Authentication Attack
ARP Request Replay Attack
WPA Theory
Handshake Theory
Capturing Handshakes
Creating Wordlist
Cracking Wordlist
Securing Network from Attacks
Post Attacks
Post-Connection Attacks
Netdiscover
Zenmap
MITM Attacks
MITM Attacks
ARP spoofing using arpspoof
ARP spoofing using MITMf
Bypassing HTTPS
DNS Spoofing
Computer Access
Gaining Access Intro
Server-side Attacks
Server-side Attacks
Server-side Attack Basics
Attacks - Metasploit basics
Exploiting a Code Execution Vulnerability
Installing MSFC
MSFC Scan
MSFC Analysis
Installing Nexpose
Nexpose Scanning
Nexpose Analysis
Client-side Attacks
Client-side attacks
Installing Veil
Overview of Payloads
Generating a Veil Backdoor
Listening for Connections
Testing the Backdoor
Fake bdm1 Update
Protecting Against Delivery Methods
Post Exploitation
Introduction
Meterpreter
Filesystem Commands
Methods to Maintain access
Website Penetration
What is a Website?
Attacking a Website
Information Gathering
Whois Lookup
Netcraft
Robtex
Discovering Subdomain
Analysing Discovering Files
SQL Injection
Basics to the SQL queries
How Injection Can be done
Cross Site Scripting Attacks
DOS Attacks
DoS/DDoS Attack Techniques.
DDoS Case Study
DoS/DDoS Attack Tools
Session Hijacking
Session Hijacking Concepts,
Network Level Session Hijacking
Client side Hijacking.
System Hacking
System Hacking Concepts
Cracking Passwords
Escalating Privileges
Hiding Files and Covering tracks