Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Ethical Hacking Certification (WS-CEH) Course

Module - 1 Networking Concepts


Module – 2 Ethical Hacking
Module - 3 Setting up Lab
Module – 4 FootPrinting and Reconnaissance
Module – 5 Scanning Network
Module – 6 Enumeration
Module -7 Vulnerabilities Analysis
Module – 8 System Hacking
Module – 9 Malware Threats
Module – 10 Sniffing
Module – 11 Social Engineering
Module – 12 Denial-of-Services, DDoS
Module – 13 Session Hijacking
Module – 14 Hacking Web Servers& Application
Module – 15 Hacking Wireless Networks
Module – 16 Hacking Mobile Platform
Module -17 Cryptography

We provide training for Web Development, C, C++, Java, Core Java, Digital Marketing, UX, UI,
AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Module - 1 Networking Concepts


Learning Objective: In this module, you will learn about the essential building blocks and
basic concepts around networking such as introduction, Working, Entities, Architecture,
Models, and so on.

 What is Computer Networking?


 How it Works?
 Types of Networks in Networking
 What is IP Address?
 IPv4 vs IPv6
 Types of IP Address
 Role of Port in Networking
 What is OSI Model?
 How it Works?
 What is TCP/IP Model?
 How it Works?
 OSI vs TCP/IP Model
 What are Network Protocols?
 Types of Protocols
 How TCP Works?
 TCP Vs UDP
 What is Domain Name?
 What is DNS?
 Records in DNS & there use.
 What is Zone File?
 What is HTML Request?
 What is HTML Response?
 Types of Request Method.
 Capturing and Analyzing Network Packets(Wireshark)

We provide training for Web Development, C, C++, Java, Core Java, Digital Marketing, UX, UI,
AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Module – 2 Introduction to Ethical Hacking & Linux


Learning Objective: In this module, you will learn about the essential building blocks and
basic concepts around Ethical Hacking such as Confidentiality, Integrity, Availability,
Scope, Laws and so on. In addition to these concepts, you will also explore the core topics
such as Intro to Linux, Basic Commands and File System.

 What is Ethical Hacking?


 Types of Hackers?
 Types of Attack on a System.
 Cyber Laws
 What is Linux?
 Cool Features of Linux
 Basic File System of Linux
 Basic Linux Commands
 Practical Linux Commands

Module – 3 Setting up Lab


Learning Objective: In this module, you will learn about the essential building blocks and
basic concepts around Hacking Lab such as Being Anonymous, Installing Kali, Adding
powerful Tools and Wordlists & so on. In addition to these concepts, you will also explore
the core topics such as Configuring VPN, PROXY, MAC Addresses.

 Installing Kali Linux in VirtualBox


 Configuring KaliLinux?
 Installing Discover Tool
 Downloading a good Wordlist.
 Installing Burpsuite Pro
 Anonymous Configuration in Linux
 Configuring Proxy
 Configuring VPN
 Changing MAC Address
 Auto Run Shell Script (Mac Changer)

We provide training for Web Development, C, C++, Java, Core Java, Digital Marketing, UX, UI,
AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Module – 4 FootPrinting and Reconnaissance


Learning Objective: In this module, you will learn about the essential building blocks and
basic concepts around Information Gathering such as Confidentiality, Integrity,
Availability and so on. In addition to these concepts, you will also explore the core topics
such as DNS, Domain and Zone file.

 What is Footprinting and Reconnaissance?


 Types of Footprinting &Reconnaissance
 Use of Footprinting &Reconnaissance
 Footprinting Through Search Engines
 Footprinting using Advance Google Hacking Techniques
 Footprinting Through Social Networking Sites
 Footprinting a Website
 Email Footprinting
 DNS Footprinting
 Whois Footprinting
 NS lookup
 Footprinting Through Discover Tool

Module – 5 Scanning Network


Learning Objective: In this module, you will glance over various aspects related to
computer networks and in-parallel delve into understanding the weaknesses & concepts
around securing the networks

 What is Network Scanning?


 Network Scanning Methodology
 Types of Network Scans
 Checking for Live Systems and its buffer size
 Checking for Open Ports
 Checking for services on ports.
 OS Fingerprinting & Banner Grabbing
 Countermeasures

We provide training for Web Development, C, C++, Java, Core Java, Digital Marketing, UX, UI,
AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Module – 6 Enumeration
Learning Objective:In this module, you will learn about the essential building blocks and
basic concepts around Enumeration such as Scanning, Exploiting, Gaining Access, Ports
and so on.

 What is Enumeration?
 Types of Enumeration
 Default Ports
 How to Enumerate NetBIOS?
 How to Enumerate SNMP?
 How to Enumerate SMTP?
 How to Enumerate NFS?
 How to Enumerate DNS?
 Countermeasures

Module – 7 Vulnerability Assessment


Learning Objective: In this module you will learn how to analyze a system for various
vulnerabilities.

 What is Vulnerability Assessment?


 Classification of Vulnerability
 Vulnerability Assessment Life-Cycle
 Vulnerability Assessment Solutions
 Vulnerability Scoring Systems
 Scanning for Vulnerability in nmap scans result?
 Vulnerability Scanning - ZAP(OWASP)

We provide training for Web Development, C, C++, Java, Core Java, Digital Marketing, UX, UI,
AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Module – 8 System Hacking


Learning Objective: In this module, you will learn about the essential building blocks and
basic concepts around System Hacking such as Methodology, Creating wordlist, Privilege
Escalation, Steganography and so on.

 What is System Hacking?


 System Hacking Methodology
 Cracking Windows Password
 Creating a Good Password list
 Escalate Privileges in Linux
 Escalate Privileges in Windows OS
 System Hacking using URL
 System Hacking using Open Ports
 What is Steganography?
 Types of Steganography
 Steganography Practical

Module – 9 Malware Threats


Learning Objective: In this module, you will learn about the essential building blocks and
basic concepts around Malware such as Trojans, Worms, Viruses, Malware Analysis,
Creating RAT and so on. In addition to these concepts, you will also explore the core
topics such as Creating Payloads etc.

 What do you mean by Malware?


 Example of Malware
 What do you mean by Trojan?
 What do you mean by Viruses and Worms?
 Types of Malware Analysis
 Static Malware Analysis
 Dynamic Malware Analysis
 How to create RAT Trojan?
 Creating Payloads
 Intro to Undetectable Payloads

We provide training for Web Development, C, C++, Java, Core Java, Digital Marketing, UX, UI,
AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Module – 10 Sniffing
Learning Objective: In this module, you will learn concept of malwares, its propagation
techniques, its types, concept of sniffing, types of sniffing attacks

 What is Sniffing?
 How an Attacker Hacks the Network using Sniffers?
 Active Scanning Techniques
 Types of Sniffing
 Protocols Vulnerable to Sniffing
 MAC Spoofing
 MAC Flooding
 DHCP Flooding
 Setup DHCP Rouge
 MITM Attack
 Sniffing with Wireshark

Module – 11 Social Engineering


Learning Objective:In this module, you will learn about the essential building blocks and
basic concepts around Human Hacking.

 Social Engineering
 Types of Social Engineering
 Human-based Social Engineering
 Computer-based Social Engineering
 Mobile-based Social Engineering
 Social Engineering using SET

We provide training for Web Development, C, C++, Java, Core Java, Digital Marketing, UX, UI,
AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Module – 12 Denial-of-Services,DDoS
Learning Objective: In this module, you will gain an overview of DoS and DDoS attacks

 What is DoS Attack?


 What is DDoS Attack?
 Basic Categories of DoS/DDoS Attack Vectors
 UDP Flood Attack
 ICMP Flood Attack
 SMURF Attack
 SYN Flood Attack
 What is DRDOS Attack?
 Performing DoS Attack
 Performing DDoS Attack
 Performing DoS/DDoS on Mobiles
 Performing MAC Flooding
 Performing DHCP Flooding

Module – 13 Session Hijacking


Learning Objective: In this module, you will learn about the essential building blocks and
basic concepts around Session Hijacking such as Confidentiality, Integrity, Session ID and
so on.

 What is Session Hijacking?


 Why is Session Hijacking Successful?
 Session Hijacking Process
 Types of session Hijacking
 Performing Session Hijacking

We provide training for Web Development, C, C++, Java, Core Java, Digital Marketing, UX, UI,
AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Module – 14 Hacking Web Servers & Application


Learning Objective: In this module, you will learn the importance of Application-level
security. You will also explore various known application weaknesses, techniques to
attack them, and various controls/solutions to these vulnerabilities. You will also get an
overview of countermeasures that can be employed to protect from different threats.

 What is Web Server?


 Web Server Attacks
 Web Server Attack Methodology
 Web Application Concepts
 Web Application Hacking Methodology
 Vulnerability Scanning with Acunetix

Module – 15 Hacking Wireless Networks


Learning Objective: In this module, you will learn about the essential building blocks and
basic concepts around Wireless Devices such as Jamming, Authentication, Monitoring,
Analyzing and so on.

 What is Wireless Networking?


 Types of Wireless Encryption
 Types of Wireless Threats
 Wireless Hacking Methodology
 Complete Hacking WEP WI-FI
 Basic to Advance Hacking WPA/WPA2
 How to Jam Wi-Fi

We provide training for Web Development, C, C++, Java, Core Java, Digital Marketing, UX, UI,
AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Module – 16 Hacking Mobile Platform


Learning Objective: In this module, you will learn about the essential building blocks and
basic concepts around Mobile Hacking such as Risks, Vulnerabilities and so on.

 Mobile Platform Attack Vectors (Vulnerable Areas)


 OWASP Top-10 Mobile Risks -2016
 Mobile Platform Vulnerability and Risks
 Mobile Security Guidelines
 Calls, SMS, Email Bombing on Android
 Generating Payloads (Basic to Advance)
 Using Keylogger App
 Info Gathering from Google-Account.

Module – 17 Cryptography
Learning Objective: In this module, you will learn various forms of cryptographic
techniques, their pragmatic relevance & weaknesses. You will learn how cryptography, its
components, methods, and its usage are employed in the enterprise to store and transmit
messages safely

 What is Cryptography?
 Difference Between Encoding, Hashing & Cryptography
 Types of Cryptography
 How it works?
 Cryptography tools
 Hashing Tools
 Encoding Tools

We provide training for Web Development, C, C++, Java, Core Java, Digital Marketing, UX, UI,
AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.

You might also like