Overview


This course is designed to impart knowledge about detailed knowledge of Computer Networks, various protocols used in Communication, Managing and configuring Cisco Switches and Routers and various WAN technologies. And also Securing Computer Networks, various security protocols used in Communication, configuring security mechanisms in Cisco Switches, Routers and Firewalls. The goal of this hacking course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. This course prepares you for EC-Council Certified Ethical Hacker course exam 312-50.

Enquiry Form

Submit



Course Content

Course Content


  • CCNA - ROUTING & SWITCHING:
  • Module1: Network fundamentals
  • Module2: LAN switching technologies
  • Module3: IPv4 and IPv6 routing technologies
  • Module4: WAN technologies
  • Module5: Infrastructure services
  • Module6: Infrastructure security and Infrastructure management
  • CCNA – SECURITY:
  • Module1: Secure Cisco routers
  • Module2: Implement AAA on Cisco Routers
  • Module3: Mitigate threats to Cisco Routers and Networks
  • Module4: Implement Secure Network Management and Reporting
  • Module5: Mitigate Common Layer 2 Attacks
  • Module6: Implement the Cisco IOS Firewall
  • Module7: Implement Zone Based Firewall
  • Module8: Implement Site-to-Site VPNs on Cisco Routers
  • Module9: Mini project
  • CEH – CORE:
  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS-Firewalls-and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography
  • WEB APPLICATION PENETRATION TESTER:
  • Module 01: Introduction to Web Applications
  • Module 02: Penetration Testing Process
  • Module 03: Lab Setup
  • Module 04: Information Gathering
  • Module 05: Automated Testing
  • Module 06: Manual Testing
  • Module 07: Cross-Site Scripting
  • Module 08: Host Header Injection
  • Module 09: URL Redirection
  • Module 10: Parameter Tampering
  • Module 11: Authentication and Authorization
  • Module 12: SQL Injection
  • Module 13: File Uploading
  • Module 14: Cross Site Request Forgery
  • Module 15: Report Writing

Learning is a weapon of Destroying Our Illness....