Ethical Hacking Workshop
- Ethical Hacking Concepts (CEH V11)
- Cyber Security Concepts
- Comtiia Security+
Free
- +91 7042947410/+917303448909
- jntechnetworks@gmail.com
Register Now for the ETHICAL HACKING WORKSHOP
JNtech Networks is going to conduct 10 hours of Ethical Hacking and Cyber Security online workshop, in which we will provide you the classes over the ethical Hacking CEH V11, Cyber Security, CompTIA Security+ and other related topics for the same
We are going to cover up the following topics in the workshop:-
Basics of Networking
- Introduction to computer Networks
- Types of Network Media
- Networking Hardware
- Types of communication
- Networking component
- What is Client and server
- What is LAN , WAN, MAN
Know your Environment
- What is an Operating system
- Different types of Operating systems
- Windows vs. Linux and Unix
- Difference between open source & Closed Source software
- What is a Kernel
- Learning Windows Basics
- Working with Windows
- What is Virtualization
- Difference between VMware and Oracle Virtual Box
- Difference Between Ethical Hacking , Cyber Security and Penetration Testing
- Types of Penetration testing OS
- What Is Kali Linux
- Installing Kali Linux in Vmware
- Installing Kali Linux in Oracle Virtual Box
- Installing Multiple Bootable OS in Pen drive
Getting comfortable with Kali Linux
- Working with Linux
- What is Grub
- Linux Boot sequence
- Kali command line interface
- What is Package Manager
- How to install and remove software from Kali Linux
- What is Root
- Changing file permissions
Risk Management
- The CIA of Security
- What is Risk
- Threat Actors
- Managing Risk
- Security Training
Tools of the Trade
- OS Utilities 1
- OS Utilities 2
- Network Scanners
- Protocol Analyzers
- Logs
ENUMERATION AND INFORMATION GATHERING
- What is Enumeration?
- Enumeration techniques and Tools, Enumerating User Accounts through Open source Intelligence and other tools
- Enumerating running services and technology about target
- Enumerate running services and technology on target
- Google Hacking
SYSTEM HACKING
- Administrator Password Guessing
- Manual Password Cracking Algorithm
- Automated Password Cracking, Password Types
- Difference between LM and NT hash
- Brute-forcing password hash
- Analyzing malware
- Static Analysis of malware using reverse engineering method
- Dynamic Analysis of malware in isolated environment
- Threat Hunting techniques to find hidden malwares
DENIAL OF SERVICE
- What is Denial of Service?
- Goal of DoS (Denial of Service)
- Impact and Modes of Attack, DoS Attack Classification
- Dos and DDoS difference
- DoS Attack tools
SOCIAL ENGINEERING
- What is Social Engineering? Art of Manipulation
- Human Weakness, Common Types of Social Engineering
- Human Based Impersonation
- Hacking using social engineering and phishing
INTERNET CONTENT FILTERING TECHNIQUES
- Introduction to Internet Filter
- Key Features of Internet Filters
- Pros & Cons of Internet Filters
- Internet Content Filtering Tool
- Internet Safety Guidelines for Children
PRIVACY ON THE INTERNET
- Internet, Proxy, Spyware, Email privacy, Cookies
- How Google Stores Personal Information
- Google Privacy Policy, Web Browsers, Web Bugs
- Downloading Freeware, Torrent files and risk of warez group
- Electronic Commerce
- Internet Privacy Tools: Anounimity , Proxy
- Best Practices, Counter measures
Enrollment
Get started with us to explore the exciting