Learn how to do ethical hacking, penetration testing, web testing, and wifi hacking using kali linux!
For IT & Computer science Engineers
Course Type
Topic 1 | Introduction to Ethical Hacking
Session 1-Introduction to Ethical Hacking
Topic 2 |What Is Footprinting And Reconnaissance?
Session 2-What Is Footprinting And Reconnaissance?
Topic 3 | Footprinting Through Social Engineering
Session 3-Footprinting Through Social Engineering
Topic 4 | Overview of network scanning
Session 4-Overview Of Network Scanning
Topic 5 | Banner Grabbing
Session 5-Banner Grabbing
Topic 6 | Enumeration concepts
Session 6-Enumeration Concepts
Topic 7 | MTP and DNS Enumeration
Session 7-MTP and DNS Enumeration
Topic 8 | Vulnerability Assessment
Session 8-Vulnerability Assessment
Topic 9 | Vulnerability Assessment reports
session 9-What is a Vulnerability Assessment Report?
Topic 10 | System Hacking Methodology
Session 10- System Hacking Methodology
Topic 11 |Executing Applications
Session 11-Executing Applications
Topic 12 | Introduction to Malware
Session 12-Introduction to Malware
Topic 13 | Trojan Concepts
Session 13-Trojan Concepts
Topic 14 | Sniffing Concepts
Session 14- Sniffing Concepts
Topic 15 | Spoofing Attack
Session 15-Spoofing Attack
Topic 16 | Social Engineering Concepts & Techniques
Session 16- Social Engineering Concepts & Techniques
Topic 17 | Impersonation on social Networking Sites
Session 17-Impersonation on social Networking Sites
Topic 18 | DoS/DDoS Concepts
Session 18-DoS/DDoS Concepts
Topic 19 | Session hijacking Concepts
Session 19-Session hijacking Concepts
Topic 20 | Application Level Session Hijacking
Session 20- Application Level Session Hijacking
Topic 21 | IDS Firewall and Honeypot concepts
Session 21- IDS Firewall and Honeypot concepts
Topic 22 | Firewall and Honeypot solutions Countermeasures
Session 22- Firewall and Honeypot solutions Countermeasures
Topic 23 |Web App hacking Methodology
Session 23-Web App hacking Methodology
Topic 24 | Web Application Concepts
Session 24-Web Application Concepts
Topic 25 | SQL Injection concepts
Session 25-SQL Injection concept
Topic 26 | Evasion Techniques
Session 26-Evasion Techniques
Topic 27 | Wireless Concepts
Session 27- Wireless Concepts
Topic 28 | Wireless Hacking Methodology
Session 28- Wireless Hacking Methodology
Topic 29 | Mobile Platform Attack vectors
Session 29-Mobile Platform Attack vectors
Topic 30 | Mobile device Management
Session 30-Mobile device Management
Topic 31 | IOT Architecture
Session 31- IOT Architecture
Topic 32 | Introduction to cloud Computing
Session 32-Introduction to cloud Computing
Topic 33 | Cloud Computing Attacks
Session 33-Cloud Computing Attacks
Topic 34 | Cryptography concepts
Session 34- Cryptography concepts
Lab Manual
Copyright © 2022 ABCTrainings - All rights reserved