Pre-requisite: : Networking Knowledge, Or Basic Knowledge in Computers.
In this course you will learn how to find critical information that helps you to hack into computer / applications, later tool, techniques and technologies that help you to penetrate (hack) into your target- Ethical Hackers have high demand and have excellent job scope around the world- You can just dig information in job portals about the job scope and salaries paid- According to Nasscom (INDIA), India needs 188,000 security professionals by 2012, its 2014 now, you can expect the job scope around the world
SYLLABUS
1. Introduction to Ethical Hacking.
2. Hands on Linux / Ubuntu.
3. Hands on Windows Command Line tools.
4. Protocols.
5. Internet Governance.
6. Reconnaissance.
7. Google Hacking.
8. Scanning.
9. Enumeration.
10. System Hacking.
11. Proxies Servers.
12. Key loggers.
13. Trojans and Backdoors.
14. Viruses and Worms.
15. Sniffing.
16. Social Engineering.
17. Email Hacking
18. Hacking Routers.
19. Session Hijacking.
20. Hacking Web servers.
21. SQL Injection.
22. XSS Attacks (Cross-site Scripting).
23. CSRF Attacks (Cross-site Request Forgery).
24. DOS and DDOS attack
25. RFI and LFI.
26. Buffer Overflows.
27. Reverse Engineering.
28. Cryptography.
29. Firewalls.
30. Physical Security.
31. Wireless Hacking.
32. Metasploit.
33. Mobile Hacking.
34. Web Application Penetration Testing
34 A) WAPT- Basics/Introduction
34 B) WAPT- OWASP TOP 10