Training Highlights

Industry recognized certificate
Worldwide companies use DigiGrowHub for hiring every year. So a certificate from DigiGrowHub is recognized everywhere




Previous
Next
What placement assistance will you receive?
Free Placement Preparation Training
Access to curated Internships & Jobs
Top performers will be highlighted in their internship & job applications

What will be the training syllabus?
Course Curriculum
Module 1 : Introduction to Ethical Hacking
What is Hacking? Introduction & Types
Potential Security Threats To Your Computer Systems
Skills Required to Become a Ethical Hacker
-
Fundamental Security Concepts
00:00 -
Threats to Information Security
-
Cyber Kill Chain
-
Cyber Security Laws and Standards
-
Cyber Security Policies
Module 2: Footprinting and Reconnaissance
What is Social Engineering? Attacks, Techniques & Prevention
Cryptography Tutorial: Cryptanalysis, RC4, CrypTool
How to crack password of an Application
Worm, Virus & Trojan Horse: Ethical Hacking Tutorial
Learn ARP Poisoning with Examples
Wireshark Tutorial: Network & Passwords Sniffer
How to Hack WiFi (Wireless) Network
DoS (Denial of Service) Attack Tutorial: Ping of Death, DDOS
How to Hack a Web Server: Ethical Hacking Tutorial
How to Hack a Website
SQL Injection Tutorial
Hacking Linux OS: Complete Tutorial with Ubuntu Example
CISSP Certification Guide
Digital Forensics
Cybercrime
-
Introduction to Footprinting
-
Introduction to Reconnaissance
-
Website Footprinting
-
HTTrack (Demo)
-
Shodan
-
Hacking Mobile Platforms
-
Google Hacking Database
-
whois
-
Banner Grabbing
-
Footprinting Countermeasures
Module 3: Scanning and Enumeration
-
Introduction to Network Scanning
-
Ping Command
-
NMAP
-
Hping3
-
Cryptography
-
Introduction to Enumeration
-
Enumeration Countermeasures
-
SMB Enumeration
-
NetBIOS Enumeration
-
DNS Enumeration
Module 4: System Hacking
-
Introduction to Vulnerabilities
-
Vulnerability Assessment
-
Types of Password Attacks and Defenses
-
Password Cracking with Medusa
-
Privilege Escalation
-
Malware: Keyloggers
-
Malware: Rootkits
-
Malware: Trojans
-
Malware: Introduction to Viruses
-
Malware: Types of Viruses
-
Malware: Worms
-
Detecting Malware
-
Malware Countermeasures
Module 5: Network and Perimeter Hacking
-
Social Engineering Countermeasures
-
Introduction to DoS and DDoS Attacks
-
Types of DoS and DDoS Attacks
-
DDoS Tools and Countermeasures
-
Introduction to Session Hijacking
-
IDS and Firewall Evasion Techniques
-
WAF Detection with WAFW00F
-
Gaining Remote Access
-
Introduction to Sniffing
-
Sniffing Attacks
-
Sniffing Tools
-
Sniffing Countermeasures
-
Introduction to Social Engineering
Module 6: Web Application Hacking
-
Web Server Attack Methodology
-
Types of Web Server Attacks and Countermeasures
-
Web Application Threats
-
Web Application Hacking Methodology
-
Introduction to SQL Injection Attacks
-
Command Injection Attack
-
Web Attack Countermeasures
Module 7: Wireless Network Hacking
-
Introduction to Wireless
-
Wireless Attacks and Countermeasures
Module 8: Mobile Hacking
-
WASP Top 10 for Mobile
-
Mobile Attacks and Countermeasures
Module 9: IoT and OT Hacking
-
Introduction to IoT Hacking
-
IoT Communication Models and Operating Systems
-
IoT Attacks and Threats
-
IoT Attack Countermeasures
-
OT Concepts
-
OT Attacks and Countermeasures
Module 10: Cloud Computing
-
Introduction to Cloud Environments
-
Cloud Computing Services
-
Benefits of Cloud Computing
-
Cloud Threats and Attacks
-
Cloud Security Considerations
Module 11: Cryptography
-
Introduction to Cryptography
-
Hashing, Digital Certificates and Digital Signatures
-
Cryptography Attacks and Countermeasures