calendar-q6k2ec84qz40svigryqkjjaeneovr39c2qothxg510-q6qgbbptjpoj3kq8zqjyov7ylihbtibi20n2dp2u7o

Start Date

May 2023

duration-q6nv94ccohi4lh36u3cq6s2l6h7q278l41k9uqglf8

Duration

3 Months

donor-consent-form-q6k2ec84qz40svigryqkjjaeneovr39c2qothxg510-q6qgclrwulfkwgvcisgol1ljpe6baoeckcluw96jqs

Enrol Now

Book Your seat

donation-1-q6k2ehv5vzbqqja9v16byhv67px319vq3ilqdl7rzo-q6qic0ki2h6sxz54j5pbiiv8e8772uw81suug1at10

Course Fee

PKR 35,000

workshop-q6k2ehv5vzbqqja9v16byhv67px319vq3ilqdl7rzo-q6qiccsejbnj4wndjszgwxs848iyux8qfhc5omsos4

Study Mode

Online / On Campus

What is this course about?

The best way to secure your web assets is to learn how an attacker or hacker will attack. In this Cybersecurity and White Hat Hacking course, you will have a hands-on experience under the supervision of our expert tutor regarding the administrative controls, technical controls, and physical controls as well as study confidentiality, integrity, availability of data, and other basics of ethical hacking. You will also learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

Become a Cybersecurity and White Hat
Hacking Expert in just 3 months

Course Curriculum

Here is what’s included in this Cybersecurity and White Hat Hacking Course
Module 1: Introduction to Ethical Hacking

– Basic Terminologies

– Current Security Issues and requirement for testing

– Hacking Concepts

– Penetration Testing

– Difference between Ethical Hacking and Penetration Testing

– Hacking Phases

– Security and Defense in Depth

– Overview of Security and Controls

– Vulnerability Assessment

– Laws for Ethical hacking and Penetration Testing

– Scope of Penetration Testing

– Documentation techniques for penetration testing

Module 2: Reconnaissance and Footprinting

– Understanding reconnaissance and footprinting

– Understanding different techniques for NetBIOS Enumeration

– Understanding different techniques for SNMP enumeration

– Understanding different techniques for LDAP enumeration

– Footprinting using whois

– Footprinting using search engine

– Introduction to Shodan

– Footprinting using Shodan

– Footprinting using GHDB

– Email footprinting

– Website footprinting

– Network footprinting

– DNS footprinting

– Introduction to social engineering

– Whois

– Shodan.io

– Whois.domaintools.com

– didtheyreadit

– haveibeenpwned

– nslookup

– recon-ng

– pOf

– Google Dork

– Google hacking database

– Netdiscover

– Angry IP scanner

– The harvester

– Hunter.io

Module 3: Scanning

– Scanning Concept

– Techniques to see Online systems

– Port Scanning

– Nmap Script Engine (NSE)

– IDS and Firewall Evasion Techniques

– Understanding Network Posture

– Changing Mac Address

– Spoofing

– Masscan

– Nmap

– Zenmap

– Macchanger

Module 4: Vulnerability Analysis

– Vulnerability of the management life cycle

– Vulnerability analysis with automated tools.

– Vulnerability Score

– Nessus

– OpenVas

– Nmap

– OWASP-ZAP

– Nikto

Module 5: Introduction to Malwares and threats

– Malware and its types

– Malware detection mechanism

– Introduction to Virustotal

– Ways to make malware undetected

– Virustotal

– No-distribute

Module 6: System Hacking / Testing

– Understanding Metasploit framework

– Using auxiliaries

– Using payload

– Using Exploits

– Importing public exploits

– Privilege Escalation techniques

– Creating payloads/malware

– Metasploit

– Armitage

– Exploit-db

Module 7: Network Testing

– Understanding Man in the middle concept

– Understanding Sniffing

– Understanding MAC Attack and MAC Spoofing

– Understanding ARP Poisioning

– Understanding DNS Poisoning

– Wireshak

– Network Miner

– Bettercap

– Macchanger

Module 8: Wireless testing and Cracking

– Wireless encryption algorithm

– Wireless handshake capturing

– Cracking

– Capturing handshake in virtual environment

– Aircrack-ng

– Bettercap

– Hashcat

-Crackstation.net

Module 9: Denial of Service (DOS)

– Understanding DOS Attack

– Understanding DDOS Attack

– Understanding Botnet

– LOIC (Low Orbit ION Cannon)

– HULK

Module 10: Session Hijacking

– Understanding session hijacking

– Wireshark

Module 11: Hacking / testing Web Server

– Understanding web server working and attack methodology

– Metsploit

– Nmap

– Nikto

– Dirbuster

– Gobuster

Module 12: Hacking / Testing Web Application

– Understanding web application vulnerabilities

– Web Application vulnerability exploitation

– Web application hacking/testing using Burpsuite

– Application level session hijacking

– Burpsuite

– SQLmap

– XSSER

– OWASP-ZAP

– Nikto

– Dirbuster

– Gobuster

Module 13: Mobile Hacking / Testing

– Understanding mobile hacking (Android)

– Metasploit

– FatRat

– L3mon

Module 14: IOT Hacking / Testing

– IOT concepts

– IOT hacking using sessions grabbing

– Metsploit

– Nmap

Module 15: Cloud Computing

– Understanding cloud computing

– Understanding cloud computing threats and attacks

Module 16: Cryptography

– Understanding Cryptography

– Understanding Symmetric and Asymmetric Encryption techniques

– Understanding Email Security and testing

Module 17: Report Creation

– Making a professional penetration testing report

Entry Requirements

Basic understanding of computer skills, networking and basics of programming.

Meet Our Trainers

Our experienced Cybersecurity and White Hat Hacking expert are here to help you understand the concepts of ethical hacking and to apply them practically for your successful career 
WhatsApp-Image-2023-04-14-at-12.19.44-PM-q6k2ehv6hwpyjjd52hlx0jacqe0wd5hl1ewbgage08-q6qif4fb9ou54kpilghiba29lqzoupu532s7mnxkh4

Engr. Anjum Nazir

Expertise:
Cyber Security Architect, Blockchain, Linux/DevOps
Doctor of Philosophy - PhD, Computer and
Information Systems Security/Information Assurance
NUCES

Benefits of the course

Learn to get into the minds of the hackers and pre-emptively protect your online assets

Enhance your knowledge about vulnerabilities and risk

Safeguard businesses and prevent any unnecessary losses

Sign up now for more information

Sign up now for more information

More Questions?

Get in touch