CERTIFICATION IN ETHICAL HACKING - Professional

WHY WE SHOULD CHOOSE HACKERSLASH?

# 40 Hours Of Live Instructor-Led Training
# Real-Time Penetration Testing
# Access To Industry Based Tools
# 100% Practical Class
# Job Placement Assistant
# Lifetime support
# Scholarship

Course Overview

CERTIFICATION IN ETHICAL HACKING will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

WHY IS ETHICAL HACKING IN DEMAND GLOBALLY?

Course Outline

INTRODUCTION

Lecture 1 : WHAT IS HACKING
Lecture 2 : WHAT IS ETHICAL HACKING
Lecture 3 : TYPES OF HACKERS
Lecture 4 : WHITE HAT HACKERS
Lecture 5 : BLACK HAT HACKERS
Lecture 6 : GREY HAT HACKERS
Lecture 7 : SCRIPT KIDDIE
Lecture 8 : HACKTIVISTS
Lecture 9 : SPY HACKERS
Lecture 10 : CYBER TERRORISTS
Lecture 11 : VULNERABILITY
Lecture 12 : EXPLOIT
Lecture 13 : REMOTE EXPLOIT
Lecture 14 : LOCAL EXPLOIT
Lecture 15 : ZERO-DAY
Lecture 16 : ZERO DAY VULNERABILITY
Lecture 17 : ZERO DAY EXPLOIT
Lecture 18 : BRUTE FORCE ATTACK
Lecture 19 : REMOTE ACCESS
Lecture 20 : PAYLOAD
Lecture 21 : INFORMATION GATHERING
Lecture 22 : ACTIVE INFORMATION GATHERING
Lecture 23 : PASSIVE INFORMATION GATHERING
Lecture 24 : SCANNING
Lecture 25 : GAINING ACCESS
Lecture 26 : MAINTAINING ACCESS
Lecture 27 : COVERING TRACKS
Lecture 28 : VIRUSES & WORMS
Lecture 29 : TROJAN HORSES
Lecture 30 : SPYWARE
Lecture 31 : ADWARE
Lecture 32 : BACKDOOR
Lecture 33 : ROOTKITS
Lecture 34 : RANSOMWARE
Lecture 35 : WHAT IS PENETRATION TESTING
Lecture 36 : TYPES OF PENETRATION TESTING
Lecture 37 : WHAT IS WHITE BOX PENETRATION TESTING
Lecture 38 : WHAT IS BLACK BOX PENETRATION TESTING
Lecture 39 : INTRODUCTION TO LINUX OS
Lecture 40 : PHISHING
Lecture 41 : SOCIAL ENGINEERING
Lecture 42 : GOOGLE HACKING USING GOOGLE DORKS

LAB SETUP AND CONFIGURATION

Lecture 43 : WHAT IS VIRTUAL MACHINE
Lecture 44 : WHAT IS VMWARE
Lecture 45 : WHAT IS VIRTUALBOX
Lecture 46 : INSTALL VIRTUALBOX
Lecture 47 : INSTALL KALI LINUX
Lecture 48 : INSTALL WINDOWS OS

SYSTEM HACKING

Lecture 49 : VULNERABILITY SCANNING USING NESSUS
Lecture 50 : EXPLOIT USING METASPLOIT
Lecture 51 : NETWORK SCANNING USING NMAP
Lecture 52 : WINDOWS 10 HACKING
Lecture 53 : WINDOWS 10 UAC BYPASS

SOCIAL ENGINEERING

Lecture 54 : PHISHING ATTACK
Lecture 55 : SETOOLKIT USAGES
Lecture 56 : RAT (REMOTE ACCESS TROJAN)
Lecture 57 : USING RAT HACK SYSTEMS
Lecture 58 : NGROK USAGES
Lecture 59 : ANDROID PHONE HACKING

WIFI HACKING

Lecture 60 : WIFI ENCRYPTION
Lecture 61 : HACK WIFI ACCESS POINT
Lecture 62 : DOS ATTACK
Lecture 63: DDOS ATTACK

WEB APPLICATION PENETRATION TESTING

Lecture 64 : HOW WEB APPLICATION WORKS
Lecture 65 : REQUEST AND RESPONSE
Lecture 66 : INSTALLING SCANNER (ACUNTIX, NET-SPARKER)
Lecture 67 : WEBSITE BASIC
Lecture 68 : OWASP TOP 10
Lecture 69 : WHAT IS SQL-INJECTION
Lecture 70 : TYPES OF SQL-INJECTION
Lecture 71 : LIVE DEMO ON SQL-INJECTION
Lecture 72 : WHAT IS XSS
Lecture 73 : TYPES OF XSS
Lecture 74: LIVE DEMO ON XSS ALL TYPES
Lecture 75 : WHAT IS HTML INJECTION
Lecture 76 : LIVE DEMO ON HTML INJECTION
Lecture 77 : WHAT IS DIRECTORY LISTING
Lecture 78 : LIVE DEMO ON DIRECTORY LISTING
Lecture 79 : WHAT IS BROKEN AUTHENTICATION
Lecture 80 : LIVE DEMO ON BROKEN AUTHENTICATION
Lecture 81 : WHAT IS TAMPER DATA
Lecture 82 : LIVE DEMO ON TAMPER DATA ON E-COMMERCE SITE
Lecture 83 : WHAT IS WEB SHELL
Lecture 84 : HACK WEB SERVER USING WEB SHELL

Who Is It For?

Who Is It For?

# Information Security Analyst/Administrator
# Information Assurance (IA) Security Officer
# Information Security Manager or Specialist
# Information Systems Security Engineer/Manager
# Information Security Professionals/Officers
# Information Security/IT Auditors
# Risk/Threat/Vulnerability Analyst
# System Administrators
# Network Administrators and Engineers

Prerequisites

# Basic knowledge about Networking (Optional)
# Basic computer knowledge (Website, Social media, email, Internet)
| 8500 TAKA for Bangladeshi Students

| $150 US Dollars for International Students

CONTACT US FOR A DISCOUNT.

Become an Ethical Hacker