Ethical Hacking Workshop

Free

Register Now for the ETHICAL HACKING WORKSHOP

JNtech Networks is going to conduct 10 hours of Ethical Hacking and Cyber Security online workshop, in which we will provide you the classes over the ethical Hacking CEH V11, Cyber Security, CompTIA Security+ and other related topics for the same

We are going to cover up the following topics in the workshop:-

Basics of Networking

  • Introduction to computer Networks
  • Types of Network Media
  • Networking Hardware
  • Types of communication
  • Networking component
  • What is Client and server
  • What is LAN , WAN, MAN

Know your Environment

  • What is an Operating system
  • Different types of Operating systems
  • Windows vs. Linux and Unix
  • Difference between open source & Closed Source software
  • What is a Kernel
  • Learning Windows Basics
  • Working with Windows
  • What is Virtualization
  • Difference between VMware and Oracle Virtual Box
  • Difference Between Ethical Hacking , Cyber Security and Penetration Testing
  • Types of Penetration testing OS
  • What Is Kali Linux
  • Installing Kali Linux in Vmware
  • Installing Kali Linux in Oracle Virtual Box
  • Installing Multiple Bootable OS in Pen drive

Getting comfortable with Kali Linux

  • Working with Linux
  • What is Grub
  • Linux Boot sequence
  • Kali command line interface
  • What is Package Manager
  • How to install and remove software from Kali Linux
  • What is Root
  • Changing file permissions

  Risk Management

  • The CIA of Security
  • What is Risk
  • Threat Actors
  • Managing Risk
  • Security Training

Tools of the Trade

  • OS Utilities 1
  • OS Utilities 2
  • Network Scanners
  • Protocol Analyzers
  • Logs

ENUMERATION AND INFORMATION GATHERING

  • What is Enumeration?
  • Enumeration techniques and Tools, Enumerating User Accounts  through Open source Intelligence and other tools
  • Enumerating running services and technology about target
  • Enumerate running services and technology on target
  • Google Hacking

SYSTEM HACKING

  • Administrator Password Guessing
  • Manual Password Cracking Algorithm
  • Automated Password Cracking, Password Types
  • Difference between LM and NT hash
  • Brute-forcing password hash
  • Analyzing malware
  • Static Analysis of malware using reverse engineering method
  • Dynamic Analysis of malware in isolated environment
  • Threat Hunting techniques to find hidden malwares

DENIAL OF SERVICE

  • What is Denial of Service?
  • Goal of DoS (Denial of Service)
  • Impact and Modes of Attack, DoS Attack Classification
  • Dos and DDoS difference
  • DoS Attack tools

SOCIAL ENGINEERING

  • What is Social Engineering? Art of Manipulation
  • Human Weakness, Common Types of Social Engineering
  • Human Based Impersonation
  • Hacking using social engineering and phishing

 

 INTERNET CONTENT FILTERING TECHNIQUES

  • Introduction to Internet Filter
  • Key Features of Internet Filters
  • Pros & Cons of Internet Filters
  • Internet Content Filtering Tool
  • Internet Safety Guidelines for Children

PRIVACY ON THE INTERNET

  • Internet, Proxy, Spyware, Email privacy, Cookies
  • How Google Stores Personal Information
  • Google Privacy Policy, Web Browsers, Web Bugs
  • Downloading Freeware, Torrent files and risk of warez group
  • Electronic Commerce
  • Internet Privacy Tools: Anounimity , Proxy
  • Best Practices, Counter measures

Enrollment

Get started with us to explore the exciting

JNtech
Networks

Join Today

Contact Us