Schedule: MON – FRI 4 hours (Time: 9 AM to 1 PM & 2 PM to 6 PM ) |SAT/SUN 8 hours (9 AM to 6 PM)
What Will You Learn?
1. **Introduction to Ethical Hacking**: Understand the principles, ethics, and legal considerations of ethical hacking, and learn about the role of white hat hackers in securing systems and networks.
2. **Footprinting and Reconnaissance**: Learn how to gather information about target systems and networks using passive and active reconnaissance techniques, including OSINT (Open Source Intelligence) gathering and network scanning.
3. **Scanning and Enumeration**: Use network scanning tools to identify open ports, services, and vulnerabilities on target systems, and enumerate system resources, users, and shares to gather additional information.
4. **Vulnerability Assessment**: Identify and assess vulnerabilities in target systems and applications using vulnerability scanning tools and manual analysis techniques, and prioritize vulnerabilities based on severity and impact.
5. **Exploitation Techniques**: Learn how to exploit common security vulnerabilities, such as buffer overflows, SQL injection, cross-site scripting (XSS), and misconfigurations, to gain unauthorized access to target systems.
6. **Password Cracking and Brute Forcing**: Use password cracking tools and techniques to recover passwords, crack hashes, and bypass authentication mechanisms to gain access to systems and accounts.
7. **Privilege Escalation**: Learn how to escalate privileges on target systems by exploiting misconfigurations, vulnerabilities, and insecure permission settings to gain higher levels of access.
8. **Post-Exploitation Techniques**: Explore post-exploitation activities, such as lateral movement, persistence, data exfiltration, and covering tracks, to maintain access and evade detection.
9. **Wireless Hacking**: Learn how to exploit vulnerabilities in wireless networks, such as Wi-Fi encryption weaknesses, WPA/WPA2 vulnerabilities, and rogue access points, to gain unauthorized access.
10. **Web Application Penetration Testing**: Conduct security assessments of web applications to identify vulnerabilities, such as SQL injection, XSS, CSRF, and insecure authentication mechanisms, and exploit them to gain access or extract sensitive information.
11. **Social Engineering Attacks**: Understand social engineering techniques and tactics used to manipulate human behavior and bypass security controls, and learn how to conduct phishing, pretexting, and other social engineering attacks.
12. **Reporting and Documentation**: Learn how to document findings, vulnerabilities, and recommendations in comprehensive penetration test reports, and effectively communicate findings to stakeholders.