
- This event has passed.
Ethical Hacking Mastery Course
July 29, 2024 - September 26, 2024
$100




π ** Course Contents** π
1. **Introduction to Ethical Hacking**
– Overview of ethical hacking principles and methodologies.
– Importance of ethical hacking in cybersecurity.
2. **Setting Up Your Environment**
– π οΈ Practical hands-on installation of Parrot & Kali Linux OS using VMware.
– Installation of Metasploitable 2 for practice purposes.
3. **Reconnaissance Techniques**
– π΅οΈββοΈ Practical hands-on training in Google Hacking Database (GHDB) usage.
– Open-Source Intelligence (OSINT) techniques for information gathering.
– Certificate enumeration for passive reconnaissance.
4. **Network Scanning**
– π Practical hands-on exercises in determining live hosts on a network.
– Discovering services and operating systems using various tools.
5. **Enumeration Techniques**
– π Practical hands-on DNS enumeration techniques.
– VHOST enumeration exercises.
6. **Security Flaw Inspection**
– π΅οΈββοΈ Practical hands-on use of Searchsploit for vulnerability research.
– Analyzing security flaws on a machine using an online platform.
7. **System Hacking**
– π Practical hands-on password cracking techniques.
– Techniques for threat detection and prevention, including buffer overflow and Active Directory.
– Practical hands-on NTLM Relay Attack.
– System hacking exercises on an online platform.
8. **Understanding Threats**
– π‘οΈ Identification and mitigation of common threats.
– Practical hands-on threat detection and prevention exercises.
9. **Social Engineering**
– π Practical hands-on training with The Social-Engineer Toolkit (SET) for different scenarios.
– Application of social engineering techniques in simulated environments.
10. **Session Hijacking**
– π₯οΈ Practical exercises on session hijacking techniques.
– Demonstrations on an online platform to understand session hijacking.
11. **Denial of Service (DoS)**
– π Practical hands-on exercises on detecting DoS attacks using Wireshark.
– Understanding DoS attack vectors and mitigation strategies.
12. **Evading Detection**
– π΅οΈββοΈ Practical exercises on evading detection techniques.
– Demonstrations on an online platform to understand evasion tactics.
13. **Hacking Servers and Applications**
– π» Practical hands-on exercises on a Damn Vulnerable Web Application (DVWA) machine.
– Exploitation and penetration testing on vulnerable servers and applications on an online platform.
14. **SQL Injection & Cross-Site Scripting (XSS)**
– π Practical exercises on exploiting SQL injection vulnerabilities on a DVWA machine.
– Exercises on XSS attacks and mitigation strategies.
15. **WiFi Hacking**
– πΆ Understanding WiFi security protocols and vulnerabilities.
– Practical hands-on exercises on hacking wireless networks on your machine.
16. **Cloud and IoT Enumeration**
– βοΈ Practical exercises on enumerating cloud and IoT devices.
– Demonstrations on identifyingΒ vulnerabilities in cloud environments.
17. **Steganography and Hiding Activities**
– πΌοΈ Practical exercises using steganography tools to hide information within images, audio, and other digital media.
– Hands-on practice in concealing data and communication channels within various files and media formats.
18. **Cryptography**
– π Hands-on practical training with a collection of cryptography tools.
– Understanding cryptographic algorithms and their applications in cybersecurity.








