Launch Your Global Career with Maersk – Placement Drive 2025 @ ZebLearn | Applications Close In 0d 0h 00h 00s

ZebLearn Certification Partners – Globally Recognized Credentials!

ZebLearn partners with leading industry experts to offer genuine, career-focused certifications in SAP training, foreign languages, and professional development courses. Earn internationally recognized credentials, enhance your career prospects, and distinguish yourself with certifications valued by the industry.

cisco
apple
esb
abode
Partner
meta
pmi
ic3
Partner
Partner
Partner
Partner
communication

Course content

About Ethical Hacking Online Training Program

  • Kali Basics
  • The Terminal & Linux Commands
  • Introduction to Network Hacking / Penetration Testing
  • Networks Basics
  • Connecting a Wireless Adapter To Kali
  • What is MAC Address & How To Change It
  • Wireless Modes
  • Packet Sniffing Basics
  • WiFi Bands - 2.4GHz & 5GHz Frequencies
  • Targeted Packet Sniffing
  • Deauthentication Attack (Disconnecting Devices From Networks)
  • Gaining Access Introduction
  • Theory Behind Cracking WEP Encryption
  • WEP Cracking Basics
  • Fake Authentication Attack
  • ARP Request Replay Attack
  • Introduction to WPA and WPA2 Cracking
  • Hacking WPA & WPA2 Without a Wordlist
  • Capturing The Handshake
  • Creating a Wordlist
  • Cracking WPA & WPA2 Using a Wordlist Attack
  • Securing Your Network From Hackers
  • Configuring Wireless Settings for Maximum Security
  • Installing Windows As a Virtual Machine
  • Installing Windows as a Virtual Machine on Apple Silicon
  • Discovering Devices Connected to the Same Network
  • Gathering Sensitive Info About Connected Devices (Device Name, Ports, etc.)
  • Gathering More Sensitive Info (Running Services, Operating System, etc.)
  • What is ARP Poisoning?
  • Intercepting Network Traffic
  • Bettercap Basics
  • ARP Spoofing Using Bettercap
  • Spying on Network Devices (Capturing Passwords, Visited Websites, etc.)
  • Creating Custom Spoofing Script
  • Bypassing HSTS
  • Bypassing HSTS Recap - Firefox
  • Bypassing HSTS Recap - Chrome
  • DNS Spoofing - Controlling DNS Requests on The Network
  • Injecting Javascript Code
  • Doing All of The Above Using a Graphical Interface
  • Wireshark - Basic Overview & How To Use It With MITM Attacks
  • Wireshark - Sniffing & Analysing Data
  • Wireshark - Using Filters, Tracing & Dissecting Packets
  • Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network
  • Creating a Fake Access Point
  • Detecting ARP Poisoning Attacks
  • Detecting Suspicious Activities in the Network
  • Preventing MITM Attacks
  • Installing Metasploitable as a Virtual Machine
  • Introduction to Server-Side Attacks
  • Basic Information Gathering & Exploitation
  • Hacking a Remote Server Using a Basic Metasploit Exploit
  • Exploiting a Code Execution Vulnerability to Hack Remote Server
  • Nexpose - Installing Nexpose
  • Nexpose - Scanning a Target Server for Vulnerabilities
  • Nexpose - Analyzing Scan Results & Generating Reports
  • Server-Side Attacks Conclusion
  • Introduction to Client-Side Attacks
  • Backdoors and Payloads Basics
  • Creating Your Own Backdoor
  • Listening for Backdoor Connections
  • Hacking Windows 11 Using Your Own Backdoor
  • How to Bypass Anti-Virus Programs
  • Introduction to Social Engineering
  • Maltego Basics
  • Discovering Websites, Links & Social Accounts Associated With Target
  • Discovering Twitter Friends & Associated Accounts
  • Discovering Emails Of The Target's Friends
  • Analysing The Gathered Info & Building An Attack Strategy
  • Intro to Trojans - Backdooring Any File Type (images, PDFs, etc.)
  • Compiling & Changing Trojan's Icon
  • Spoofing .exe Extension To Any Extension (jpg, pdf, etc.)
  • Spoofing Emails - Setting Up an SMTP Server
  • Email Spoofing - Sending Emails as Any Email Account
  • Email Spoofing - Spoofing Sender Name
  • Email Spoofing - Method 2
  • BeEF Overview & Basic Hook Method
  • BeEF - Hooking Targets Using Bettercap
  • BeEF - Running Basic Commands On Target
  • BeEF - Stealing Passwords Using A Fake Login Prompt
  • BeEF - Hacking Windows 10 Using a Fake Update Prompt
  • Detecting Trojans Manually
  • Detecting Trojans Using a Sandbox
  • Ex1 - Generating a Backdoor That Works Outside The Network (05:24)
  • Configuring The Router To Forward Connections To Kali (06:59)
  • Ex2 - Using BeEF Outside The Network
  • Introduction to Post Exploitation
  • Meterpreter Basics
  • Accessing the System Commands
  • Maintaining Access (Persistence)
  • Spying - Capturing Key Strikes & Taking Screenshots (Preview)
  • Pivoting - Theory (What is Pivoting?)
  • Pivoting - Using a Hacked System to Hack Into Other Systems
  • Gathering Basic Information Using Whois Lookup
  • Discovering Technologies Used On The Website
  • Gathering Comprehensive DNS Information
  • Discovering Websites On The Same Server
  • Discovering Subdomains
  • Discovering Sensitive Files
  • Analysing Discovered Files
  • Discovering & Exploiting File Upload Vulnerabilities To Hack Websites
  • Discovering & Exploiting Code Execution Vulnerabilities To Hack Websites
  • Discovering & Exploiting Local File Inclusion Vulnerabilities
  • Remote File Inclusion Vulnerabilities - Configuring PHP Settings
  • Remote File Inclusion Vulnerabilities - Discovery & Exploitation
  • Preventing The Above Vulnerabilities
  • What is SQL?
  • Dangers of SQL Injection Vulnerabilities
  • Discovering SQL injections In POST
  • Discovering SQL Injections in GET
  • Reading Database Information
  • Discovering Database Tables
  • Extracting Sensitive Data From The Database (Such As Passwords, User info...etc)
  • Reading & Writing Files On The Server Using SQL Injection Vulnerability
  • Discovering SQL Injections & Extracting Data Using SQLmap
  • The Right Way To Prevent SQL Injection Vulnerabilities
  • Introduction to Cross Site Scripting
  • Discovering Reflected XSS
  • Discovering Stored XSS
  • Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF
  • Preventing XSS Vulnerabilities
  • Automatically Scanning Target Website For Vulnerabilities
  • Analyzing Scan Results
  • Website Hacking / Penetration Testing Conclusion
  • Writing a Pentest Report
  • 4 Ways to Secure Websites & Apps
  • Why Should You Learn Ethical Hacking Training?

    The annual salary of an Ethical Hacking is $125k.

    Request more information

    What you will get at Zeblearnindia Learning?

    Zeblearnindia Learning is a premier institute offering training in SAP Online Courses, Web Designing, Data Science, Full-Stack Development, Salesforce, Workday, Machine Learning, Software Testing, and Video Editing. With the option to choose between online and offline (classroom) learning, our well-structured courses cater to students, working professionals, business owners, and entrepreneurs. Here’s what you can expect at Zeblearnindia Learning:

    •   Expert-Led Training
    •   Globally Recognized Certifications
    •   100% Job Placement Support
    •   Hands-On Learning
    •   Flexible Learning Options
    •   Affordable Course Fees
    •   Career Growth Opportunities
    best-seller-min

    () 60 Minutes WEBINAR with CERTIFICATE

    Date Time IST (GMT +5:30) Event Free Sign Up

    Explore Our Courses Across India - Flexible batches

    We are proud to offer our Ethical Hacking Online Training Program services across numerous states nationwide.

    Call Us
    WhatsApp
    Questions? WhatsApp us.
    Placements query?

    We use cookies to improve your experience and personalize our site. cookie policy