CERTIFICATE IN ETHICAL HACKING

SEM-I

Introduction To Ethical Hacking

  • Lecture 1:      What is hacking? And what is Ethical about it?
  • Lecture 2:      Types of Hackers
  • Lecture 3:      Self-Security on Digital India 
  • Lecture 4:      What is Vulnerability
  • Lecture 5:      What is Exploit
  • Lecture 6:      What is Zero- Day
  • Lecture 7:      Steps of Hacking
  • Lecture 8:      About Information Gathering
  • Lecture 9:      Types of Information Gathering
  • Lecture 10:     Information Gathering Demo
  • Lecture 11:     What is Scanning
  • Lecture 12:     Scanning Demo using Nmap
  • Lecture 13:     What is Gaining Access
  • Lecture 14:     what is Maintaining Access
  • Lecture 15:     What is Covering Tracks
  • Lecture 16:     Google Hacking
  • Lecture 17:     Google Hacking Live Demo
  • Lecture 18:     Types of malicious files
  • Lecture 19:     Details of virus
  • Lecture 20:     Details of Worms
  • Lecture 21:     Details of Rootkit
  • Lecture 22:     Social Engineering

Build your hacking environment

  • Lecture 23:    Introduction to Linux OS
  • Lecture 24:    Introduction to Kali Linux OS, Black Spider Windows OS ,Etc
  • Lecture 25:    Introduction to Virtual Machine , Lab Offline/Online
  • Lecture 26:    Installing VMWARE station or Oracle virtual Box
  • Lecture 27:    Network Setup in Virtual Machine
  • Lecture 28:    Install Kali Linux in Virtual Machine

 System Hacking

  • Lecture 29:    Bypass Windows Login , Linux Live CD
  • Lecture 30:     Prevention of System Hacking
  • Lecture 31:     What is MAC
  • Lecture 32:     Spoof your MAC
  • Lecture 33:     What is Tor / Proxy Server
  • Lecture 34:     Spoof your IP Vpn, Antidetect, etc.

Password Cracking

  • Lecture 35:    Types of Passwords Encryption
  • Lecture 36:    Password Cracking Methods explane
  • Lecture 37:    Dictionary Attack explain
  • Lecture 38:    Best Dictionary for Hackers
  • Lecture 39:   Crack Any Software  
  • Lecture 40:    What Is Carding

Protect Your Network

  • Lecture 41:    What is NMAP
  • Lecture 42:    Network Scanning With NMAP
  • Lecture 43:    What is Vulnerability Scanning
  • Lecture 44:    Vulnerability Scanning using Nessus/Qualys Free Scan
  • Lecture 45:    What is Metasploit
  • Lecture 46:    Using Metaspolit Hack Windows System
  • Lecture 47:     What is Set-toolkit
  • Lecture 48:    Using Set-toolkit hack Facebook , Gmail Password, Etc
  • Lecture 49:    What is Remote Administration Tool [RAT]
  • Lecture 50:    Using RAT Exploit Windows OS
  • Lecture 51:     Protect Your System from RAT
  • Lecture 52:    What is Malware and preventation from Malware

 Sniff your Network

  • Lecture 53:    How to Cut on your Network
  • Lecture 54:     What Is Fud ?
  • Lecture 55:    what Is port ?

 Dos Attack

  • Lecture 58:    What is Denial Of Service/ Distributed Denial Of Service
  • Lecture 59:    Type of Dos Attack

Hacking Wireless Network / WIFI

  • Lecture 61:     What is WAP2 Encryption
  • Lecture 62:     Crack WAP2 Password
  • Lecture 63:     How to control WIFI network

Hack Web Application

  • Lecture 63:    Web Application and its basics (Understanding HTML and its response)
  • Lecture 64:    OWASP Top 10 Vulnerability
  • Lecture 65:    What is Sql-Injection
  • Lecture 66:     Scan and find ip for any website 
  • Lecture 67:     Anonymous Mail
  • Lecture 68:    Recovery Your Data 
  • Lecture 70:    Fack Gmail Making
  • Lecture 73:    Advance Search For Hackers
  • Lecture 74:    E-mail hacking using phishing
  • Lecture 75:    All the Details  VPN (Secure/Unsecure)

 Protect Your Data

  • Lecture 76:     Brute Force Attack
  • Lecture 78:      MD5 , Hash Calculator , Cryp, Advance Encryption Tools

Hack Android Mobile Phone

  • Lecture 80:       Hack Android Phone using Metasploit/Rat/etc