Overview

us-council Certified Ethical Hacking and Prevention

((Pre-Requisite Knowledge of Microsoft + Linux + Cisco))

+FREE us-council Certification Exam Voucher - Worth $300

This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. This is the only course which teaches both hacking and prevention techniques. And in keeping with Zoom's standards, this course is entirely hands on and real time oriented. And need we say, the instructors are network security and intrusion specialists with several years of experience.

Curriculum

Ethical Hacking and Prevention

2 Week

+FREE us-council Certification Exam Voucher - worth $300

Module 1: Introduction to Ethical Hacking

  • What is Hacking
  • Who is a Hacker
  • Skills of a Hacker
  • Types of Hackers
  • Reasons for Hacking
  • Who are at the risk of Hacking attacks
  • Effects of Computer Hacking on an organization
  • Network Security Challenges
  • Elements of Information Security
  • The Security, Functionality & Usability Triangle
  • What is Ethical Hacking
  • Why Ethical Hacking is Necessary
  • Scope & Limitations of Ethical Hacking
  • What is Penetration Testing
  • What is Vulnerability Auditing



Module 2: Foot Printing

  • What is Foot Printing
  • Objectives of Foot Printing
  • Finding a company’s details
  • Finding a company’s domain name
  • Finding a company’s Internal URLs
  • Finding a company’s Public and Restricted URLs
  • Finding a company’s Server details
  • Finding the details of domain registration
  • Finding the range of IP Address
  • Finding the DNS information
  • Finding the services running on the server
  • Finding the location of servers
  • Traceroute analysis
  • Tracking e-mail communications


Module 3: Scanning

  • What is network scanning
  • Objectives of network scanning
  • Finding the live hosts in a network
  • SNMP Enumeration
  • SMTP Enumeration
  • DNS Enumeration
  • Finding open ports on a server
  • Finding the services on a server
  • OS fingerprinting
  • Server Banner grabbing tools
  • What is a Vulnerability Scanning
  • Vulnerability Scanner tools
  • Finding more details about a vulnerability
  • What is a proxy server
  • How does proxy server work
  • Types of proxy servers
  • How to find proxy servers
  • Why do hackers use proxy servers
  • What is a TOR network
  • Why hackers prefer to use TOR networks


Module 4: Hacking Web Servers & Web Applications

  • What is a web server
  • Different webserver applications in use
  • Why are webservers hacked & its consequences
  • Directory traversal attacks
  • Website defacement
  • Website password brute forcing
  • How to defend against web server hacking


Module 5: Session Hijacking

  • What is session hijacking
  • Dangers of session hijacking attacks
  • Session hijacking techniques
  • Cross-Site scripting attack
  • Session hijacking tools
  • How to defend against session hijacking


Module 6: SQL Injection

  • What is SQL Injection
  • Effects of SQL Injection attacks
  • Types of SQL Injection attacks
  • SQL Injection detection tools


Module 7: Evading Firewalls, IDS & Honeypots

  • What is a Firewall
  • What are the functions of a Firewall
  • What is an IDS
  • How does an IDS work
  • SPAN
  • IDS tools
  • What is a honeypot
  • Types of honeypots
  • Honeypot tools
  • Honeypot detection tools


Module 8: Buffer Overflow

  • What is a buffer
  • Understanding usage of buffers in applications
  • What is buffer overflow
  • Simple buffer overflow in C programming
  • How to detect a buffer overflow
  • How to defend against buffer overflow attacks


Module 9: Denial of Service

  • What is a DoS attack
  • What is a DDoS attack
  • Symptoms of a DoS attack
  • DoS attack techniques
  • What is a Botnet
  • Defending DoS attacks


Module 10: Cryptography

  • What is Cryptography
  • Types of cryptography
  • Cipher algorithms
  • Public key infrastructure
  • What is a Hash
  • Cryptography attacks


Module 11: System Hacking

  • What is System Hacking
  • Goals of System Hacking
  • Password Cracking
  • Password complexity
  • Finding the default passwords of network devices and software
  • Password cracking methods
    • Online password cracking
      • Man-in-the-middle attack
      • Password guessing
    • Offline password cracking
      • Brute force cracking
      • Dictionary based cracking
      • Hybrid attack
  • USB password stealers
  • Elcomsoft Distributed password recovery tools
  • Active password changer
  • What is a keylogger
  • How to deploy a keylogger to a remote PC
  • How to defend against a keylogger


Module 12: Sniffers

  • What is a sniffer
  • How sniffer works
  • Types of sniffing
    • Active sniffing
    • Passive Sniffing
  • What is promiscuous mode
  • How to put a PC into promiscuous mode
  • What is ARP
  • ARP poison attack
  • Threats of ARP poison attack
  • How MAC spoofing works
  • MAC Flooding
  • What is a CAM Table
  • How to defend against MAC Spoofing attacks
  • How to defend against Sniffers in network


Module 13: Phishing

  • What is Phishing
  • How Phishing website is hosted
  • How victims are tricked to access Phishing websites
  • How to differentiate a Phishing webpage from the original webpage
  • How to defend against Phishing attacks


Module 14: Malware

  • What is malware
  • Types of malware
    • Virus
      • What is a virus program
      • What are the properties of a virus program
      • How does a computer get infected by a virus
      • Types of virus
      • Virus making tools
      • How to defend against virus attacks
    • Worm
      • What is a worm program
      • How worms are different from viruses
    • Trojan
      • What is a Trojan horse
      • How does a Trojan operate
      • Types of Trojans
      • Identifying Trojan infections
      • How to defend against Trojans
    • Spyware
      • What is spyware
      • Types of spywares
      • How to defend against spyware
    • Rootkits
      • What is a Rootkit
      • Types of Rootkits
      • How does Rootkit operate
      • How to defend against Rootkits


Module 15: Kali Linux

  • What is Kali Linux
  • How Kali Linux is different from other Linux distributions
  • What are the uses of Kali Linux
  • Tools for Footprinting, Scanning & Sniffing
  • What is Metasploit framework
  • Using Metasploit framework to attack Windows machines
  • Using Metasploit framework to attack Android devices


Module 16: Wireless Hacking

  • Types of wireless networks
  • Wi-Fi usage statistics
  • Finding a Wi-Fi network
  • Types of Wi-Fi authentications
    • Using a centralized authentication server
    • Using local authentication
  • Types of Wi-Fi encryption methods
    • WEP
    • WPA
    • WPA2
  • How does WEP work
  • Weakness of WEP encryption
  • How does WPA work
  • How does WPA2 work
  • Hardware and software required to crack Wi-Fi networks
  • How to crack WEP encryption
  • How to crack WPA encryption
  • How to crack WPA2 encryption
  • How to defend against Wi-Fi cracking attacks


Module 17: Penetration Testing

  • What is Penetration Testing
  • Types of Penetration Testing
  • What is to be tested
    • Testing the network devices for misconfiguration
    • Testing the servers and hosting applications for mis-configuration
    • Testing the servers and hosting applications for vulnerabilities
    • Testing wireless networks
    • Testing for Denial of Service attacks


Module 18: Counter Measure Techniques for Network Level Attacks

  • Types of Firewall
    • Packet Filtering Firewall
    • Circuit-Level Gateway Firewall
    • Application-Level Firewall
    • Stateful Multilayer Inspection Firewall
    • Limitations of a Firewall
  • IDS / IPS
    • What is an IDS
    • What is an IPS
    • Difference between IDS & IPS
    • Placement of IDS in the Network
    • Configuring an IDS in the Network
    • Placement of IPS in the Network
    • Configuring an IPS in the Network
  • UTM / Next-Generation Firewall
    • What is a UTM
    • Features of UTM
    • Difference between a Firewall & a UTM
    • Placement of UTM in the Network
    • Configuring a UTM in the Network
    • Monitoring attacks using UTM
    • Configuring IPS module in UTM to detect and stop attacks


Module 19: Counter Measure Techniques for Local Systems

  • Identifying the Vulnerabilities of a system
  • Understanding the Vulnerabilities of a system
    • CVE ID
    • Bugtraq ID
  • Patch Management
    • Identifying the patch for a Vulnerability
    • Downloading the Patch
    • Testing the patch for stability in test environment
    • Deploying the patch to Live Network
  • Finding the missing updates in an Operating System
    • Microsoft Baseline Security Analyzer
    • Belarc Advisor


Module 20: Counter Measure Techniques for Malware Attacks

  • Scanning systems for Malware infections
  • Types of anti-malwares
    • Anti-Virus
    • Anti-Worm
    • Anti-Trojan
    • Anti-Rootkit
    • Internet Security Suites
  • HIDS
  • HIPS


Course Schedule

Course Schedule

Ethical Hacking and Prevention

16 Jan 2025

04:00 PM to 06:00 PM

(IST - GMT +05:30)

2 Weeks

2 Hrs/Day

Sunday off

Online

16 Jan 2025

08:00 PM to 10:00 PM

(IST - GMT +05:30)

2 Weeks

2 Hrs/Day

Sunday off

Online

15 Feb 2025

08:00 AM to 10:00 AM

(IST - GMT +05:30)

2 Weeks

2 Hrs/Day

Sunday off

Online

15 Mar 2025

08:00 PM to 10:00 PM

(IST - GMT +05:30)

2 Weeks

2 Hrs/Day

Sunday off

Online

15 Apr 2025

08:00 AM to 10:00 AM

(IST - GMT +05:30)

2 Weeks

2 Hrs/Day

Sunday off

Online

For Online Training Students

  • Instructions will be Provided to do Lab Practicals with your PC at Home
  • You will receive link to your email from Webex in an hour after the class to Download the Recorded Videos.
  • All the study materials will be provided FREE through our  Study Material and Videos


Imp. Note

  • Fees once paid will not be refunded or adjusted against other courses / batches / students under any circumstances whatsoever.
  • Organization reserves the right to expel any student during the training period.
  • In case, a student fails to attend the given batch the amount given will be forfeited against his / her name.


Sample Certificate

sample certificate for us-council Ethical Hacking & Prevention

FAQ'S

What is US-Council Certification and how does it differ from other cybersecurity certification?

US-Council Certification is a set of comprehensive programs aiming to create cybersecurity experts capable of defending against cyber threats. Unlike other cybersecurity certification, which focuses on ethical hacking, US-Council provides a broader approach towards cybersecurity education and awareness, including proactive defense strategies and security testing services.

Why should I choose US-Council for my cybersecurity certifications?

Choosing US-Council for your cybersecurity certification ensures that you receive thorough education and awareness about the latest security measures and cyber threats. With certifications from US-Council, you gain access to free white papers, the opportunity to become an authorized partner, and insights from informative live webinars, all tailored to help you secure or perish in the face of cybercrime.
Ethical Hacking and Prevention slider promoting cybersecurity Preview this course
Duration : 2 Weeks
Mode Of Training : Online
Placement Assistance : Yes
Certificate : Yes
Price: 9,900

All prices are subject to an 18% Goods and Service Tax (GST) Charge. Rate quoted in U.S. dollars subject to change according to Foreign Exchange rates.

Once you make the payment, kindly contact our course counsellor at priya@zoomgroup.com to schedule the course as per your convenience from the available slots.