Here is an interview of Mr. Lloyd Rodrigues, discussing about the career in Ethical Hacking, What is Ethical Hacking? and other knowledge from his experience. He had also explained
- why one should be aware of ethical hacking and learn ethical hacking
- hacking categories
- his personal experience and attempts with hacking
- hacking methods
- what skill an ethical hacking should have
- how much money you can earn by becoming cyber security expert by studying from ethical hacking tutorial videos or eBooks or from any coach
- what job profile you can attain in future with ethical hacking skill
Course Content
1. ETHICAL HACKING −OVERVIEW
Types of Hacking
Purpose of Hacking
2. ETHICAL HACKING −HACKER TYPES
White Hat Hackers
Black Hat Hackers
Grey Hat Hackers
Suicide Hackers
Phreaks
3. ETHICAL HACKING −TERMS USED
4. ETHICAL HACKING −TOOLS
5. ETHICAL HACKING −SKILLS
Basic Skills
Courses &Certifications
6. ETHICAL HACKING −STEPS
FOOTPRINTING
SCANNING
ENUMERATION
SYSTEM HIJACKING
TROJANS
VIRUS & WORMS
SNIFFING
SESSION HIJACKING
WEB HIJACKING
CRYPTOGRAPHY
WIRELESS NETWORK HIJACKING
ETHICAL HACKING −PHASE OF HACKING
7. ETHICAL HACKING − FOOTPRINTING
Active Footprinting
Passive Footprinting
Domain Name Information
Finding IP Address
Finding Registrar & Hosting Company
IP Address Ranges
Google Hacking
Email Tracing
Any Website's History in Past Months or Years
Email Tracking
Website Copying
8. ETHICAL HACKING − PROXY
Direct Proxy
Logged Proxy
Proxy Chains
Proxy Chaining Tools
9. ETHICAL HACKING − SCANNING
Why is scanning important?
Types of Scanning
Steps and Protocols
IP Range Scanning Tools
10. ETHICAL HACKING − PRACTICAL LAB SETUP
Virtual Machines
Advantages of VMs
Other OSs
Virtualization
Linking Host and Guest
11. ETHICAL HACKING − ENUMERATION
Introduction
Types
Terms
12. ETHICAL HACKING − WINDOWS HACKING
Registry Editing
Keys and Values
Risks of Editing
User Access Control (UAC)
Types of Password Attack
13. ETHICAL HACKING − PASSWORD HACKING
Hiren's Boot CD
Windows Password Cracking
Kon Boot
Keylogging
14. ETHICAL HACKING − STAGENOGRAPHY & CRYPTOGRAPHY
History
Tools
Difference
15. ETHICAL HACKING − SNIFFING
Types of Sniffing
SSL and HTTPS Protocol Analyze
DHCP Attack
MAC Attack
Spoofing Attack
Switch and Hub
MITM
16. ETHICAL HACKING − VIRUS / WORMS / TROJAN
Batch Virus
Virus Designing
Usage and Misusage
Trojan Attacks
Difference between them
17. ETHICAL HACKING −SOCIAL ENGINEERING
Attack Cycle
Types Social Engineering Attack
Phishing
18. ETHICAL HACKING −Web Hacking
HTML Based Attacks
Web Servers
Parameter Tampering
Path Traversal Attacks
XSS (Cross-Site Scripting)
Web Spidering
Cookies Poising
Cookie Parameter
Web Hacking Practical Lab Setup on PC/Laptop
Types of XSS
19. ETHICAL HACKING −SQL INJECTION
SQL Queries
20. ETHICAL HACKING −DDOS ATTACKS
SYN Flood Attacks
Ping Flood Attacks
21. ETHICAL HACKING −BUFFER OVERFLOW
What is Buffer?
Data Segmentation - Heap and Stack
22. ETHICAL HACKING −SESSION HIJACKING
3 Way Handshake
Types of Session Hijacking
Spoofing vs Hijacking
Advantages of Session Hijacking to Attacker
23. ETHICAL HACKING −CERTIFICATIONS & CAREER OPPORTUNITIES
We are currently providing Classroom Courses for Ethical Hacking Online Only
We will be launching soon the Classroom Programs with complete Ethical Hacking Toolkit, so that you can learn ethical hacking from any where you want, you can then read ethical hacking pdf ebooks and watch ethical hacking tutorial videos from anywhere you wish to study. You can then practice ethical hacking lab setup and learn ethical hacking from anywhere you want.
Have Any Question ?
Leave your enquiry below:- (or Call us at +918419003132 , +918299154708 for instant query
or email us at digisolutionhub@gmail.com )
Query Form
*We will contact you on your provided e-mail