• United India colony ,Kodambakkam, Chennai.
  • +91 - 99406 11306     044-24731102/ 24732532
  • [email protected]

Ethical Hacking

Ethical Hacking Expert Objectives

In this course, you will learn about:

· What is hacking and why one should do ethical hacking?

· Different types of attacks and how to mitigate those attacks

· Different attacks associated with Mobile and Cloud technologies

· Implementing tools to perform ethical hacking

· Encrypting and decrypting the code

 Course Outcome

After competing this course, you will be able to:

· Describe ethical hacking and its importance

· Understand security posture and flow

· Identify different types of attacks and vulnerabilities and use techniques to mitigate those

· List threats associated with mobile and cloud technologies

· Practice cybersecurity techniques such as penetration testing

 · Employ penetration testing process to uncover vulnerabilities/weaknesses in a computer/system/network

 · Explain and employ encryption and decryption techniques

 Table Of Contents Outline


· Exploring Ethical Hacking

· Associated Protocols

 · Gathering Information about Target Computer Systems - Footprinting and Investigation

· Scanning Computers in the Networks

 · Vulnerabilities Associated with Systems · Exploring Malware Threats and Their Countermeasures

 · Enumeration – Listing the System/Users and Connecting Them

· Gaining Access to Systems – Hacking

 · Monitoring and Capturing Data Packets Using Sniffing

 · Restricting the System Access – Denial of Service (DoS) Attack

· Tricking People to Gather Confidential Information – Social Engineering


· Web Servers and Threats Associated with It

· Web Applications and Threats Associated with It

 · Controlling User Session with Authenticated TCP Connection - Session Hijacking

 · Injecting Code in Data Driven Applications: SQL Injection

 · Hacking Mobile Platforms and Threats Associated with It

 · Encrypting and Decrypting the Code – Cryptography and Its Types

 · Evading IDS, Firewalls and Honeypots

 · Wireless Networks and Threats Associated with It

 · Cloud Computing, Virtualisation and Threats Associated with It

 · Output Analysis and Reports

 · Economics and Laws – Passwords and Encryption