iNEWPM

Course Details

http://www.svtrainings.com/ethical-and-web-app-hacking-training.html
Day - 11) Basic networking topics

  • What is a network?
  • IP adresses
  • Classifications
Day - 21) Basic networking topics
  • Types of IP
  • Assigning of IP
Day – 31) Basic networking topics
  • IP spoofing
  • MAC spoofing
Day –42) Information Gathering
  • Active and passive techniques
  • Finding IP and OS of targets
  • DNS records
Day –52) Information Gathering
  • Mail footprints
  • Recon - ng tool
Day – 63) Scanning
  • Finding ports and services
  • Angry IP scanner, Superscan
Day – 73) Scanning
  • TCP/IP and UDP
  • Types of flags
Day – 83) ScanningnmapDay – 94) Enumeration
  • System level enumeration
  • SID and RID
Day – 104) Enumeration
  • User2sid and Sid2user
  • Null session
Day –115) Windows hacking
  • Password hacking
Day – 125) Windows hacking
  • Keyloggers
  • Steganography
Day – 136) Trojans and Malwares
  • Beast trojan
  • Virus creation using batch file programing
  • Classification between malwares, viruses and worms
Day – 147) Sniffing
  • Wireshark
Day – 157) Sniffing
  • Cain
  • and able (MITM)
  • Analyzing nmap scan types
  • Dos and DDos attacks
Day – 168) Web attacks
  • Google hacking
  • Directory listing
  • Information leakage
  • Brute force attack
Day – 179) Vulnerability assessment
  • Burpsuite
  • Nikto
Day – 189) Vulnerability
  • assessment
  • ZAP proxy
  • IBM app scan
Day - 1910) Penetration testing
  • msf framework
  • Identifying vulnerabilities and exploits using web resources
  • Manual penetration testing
Day - 2011) Cryptography
  • Hashing
  • Symmetric and
  • Asymmetric
  • Types of algorithms
  • Encryption and Encoding
12) Software crackingDay – 21 (Theory topics)13) Firewall/IPS/IDS/Honeypots14) Social engineering15) Physical security16) Patch management17) OSI layer

Are you providing Training Classes
IT Courses / Govt Exam Preparation
Higher Studies / Studies Abroad
NEWFreeCompanies HiringUpdates//nuPM