Ethical Hacking Training – Hacking Level-1

Specially designed certification for freshers who are looking for building a solid career in Cyber security and ethical hacking Industry.

Program Overview

Top Industry experts Trainers
100% Free Exam Voucher worth Rs 7500 or USD $150
Test Prep Guide
Toolkit for various labs
tudy Guide – Printed copy
Industry recognition -Participation certification + Exam Voucher
40% Discount voucher for HL-2 training and Exam Voucher
100% Practical Job oriented training

100% Placement Programs

CCIE Enterprise
Integrated

CCIE Security
Integrated

CCIE DATACENTER
Integrated

CLOUD
Masters

CyberX
Masters

Networking
Masters

Program Information

Want to Study most Deep dive Ethical hacking certification available in Market .HL -1 is specially designed certification for freshers who are looking for building a solid career in Cyber security and ethical hacking Industry .Have a look at Course syllabus given below and you will understand the topics covered and depth provided in the program .HL-1 leads to Next level of Certification called HL-2 which is Penetration testing Certification.

HL-1 Training Fee: 8,500 + 18% GST = INR 10,030 (Indian Students)
HL-1 Training Fee: USD 350 (International Students)
HL-1 Training Duration: 4 Weeks (2 Hours a day)
HL-1 Training Duration: Fast Track Bootcamp (4 Days) (Not for freshers)
Online mode batches available
Batches Available in Weekdays (Mon-Fri) and Weekends (Sat, Sun)
Training delivered by Certified Professionals with enormous industry experience

HL-1 is one of the best hacking core training program for professionals who wants to build a career in advance network security as well as ethical hacking .Designed by Top Cyber Security experts in the world .HL-1 is level 1 certification which teaches you all basic theory concepts as well as hands on labs on Wired, Wireless ,Web and Network Hacking techniques .Checkout the Course syllabus below and you will find our program content as more deep dive and detailed as compared to any Ethical hacking certification in market . Designed for freshers ,program takes you into 17 different Modules

Its a 4 -6 Weeks Part time Training program covering the best and modern hacking tools used in professional hacking industry. This course will introduce students to the foundations and landscape of ethical hacking through both lecture and working in a virtual environment. The course will focus on basic penetration testing concepts such as reconnaissance and exploitation as well as introducing general security fields such as network, Web, and application security.

Who Is This Program For?

Specially designed certification for freshers who are looking for building a solid career in Cyber security and ethical hacking Industry.

Course Contents

Introduction

Course Introduction & Overview
What Is Ethical Hacking & Why Learn It ?

Setting up the Lab

Lab Overview & Needed Software
Installing Kali 2018 As a Virtual Machine
Installing Metasploitable As a Virtual Machine
Installing Windows As a Virtual Machine
Creating & Using Snapshots

Linux Basics

Basic Overview of Kali Linux
The Terminal & Linux Commands

Network Penetration Testing

Network Penetration Testing Introduction
Networks Basics
Connecting a Wireless Adapter To Kali
What is MAC Address & How To Change It
Wireless Modes (Managed & Monitor)
Enabling Monitor Mode Manually (2nd method)
Enabling Monitor Mode Using airmon-ng (3rd method)

Network Penetration Testing – Pre Connection Attacks

Packet Sniffing Basics Using Airodump-ng
Targeted Packet Sniffing Using Airodump-ng
Deauthentication Attack (Disconnecting Any Device From The Network)
Creating a Fake Access Point (Honeypot) – Theory
Creating a Fake Access Point (Honeypot) – Practical

Network Penetration Testing – Gaining Access

Gaining Access Introduction
WEP Cracking – Theory Behind Cracking WEP Encryption
WEP Cracking – Basic Case
WEP Cracking – Fake Authentication
WEP Cracking – ARP Request Replay Attack
WPA Cracking – Introduction
WPA Cracking – Exploiting WPS Feature
WPA Cracking – Theory Behind WPA/WPA2 Cracking
WPA Cracking – How To Capture The Handshake
WPA Cracking – Creating a Wordlist
WPA Cracking – Using a Wordlist Attack
Securing Your Network From The Above Attacks
How to Configure Wireless Security Settings To Secure Your Network

Network Penetration Testing – Post Connection Attacks

Introduction
Information Gathering – Discovering Connected Clients using netdiscover
Gathering More Information Using Autoscan
Gathering Even More Information Using Zenmap
MITM – ARP Poisoning Theory
MITM – ARP Spoofing using arpspoof
MITM – ARP Spoofing Using MITMf
MITM – Bypassing HTTPS
MITM – Session Hijacking
MITM – DNS Spoofing
MITM – Capturing Screen Of Target & Injecting a Keylogger
MITM – Injecting Javascript/HTML Code
MITM – Using MITMf Against Real Networks
Wireshark – Basic Overview & How To Use It With MITM Attacks
Wireshark – Sniffing Data & Analysing HTTP Traffic
Wireshark – Capturing Passwords & Cookies Entered By Any Device In The Network

Network Penetration Testing – Detection & Security

Detecting ARP Poisoning Attacks
Detecting suspicious Activities Using Wireshark

Gaining Access To Computer Devices

Gaining Access Introduction

Gaining Access – Server Side Attacks

Introduction
Basic Information Gathering & Exploitation
Using a Basic Metasploit Exploit
Exploiting a Code Execution Vulnerability
MSFC – Installing MSFC (Metasploit Community)
MSFC – Scanning Target(s) For Vulnerabilities
MSFC – Analysing Scan results & Exploiting Target System
Nexpose – Installing Nexpose
Nexpose – How To Configure & Launch a Scan
Nexpose – Analysing Scan Results & Generating Reports

Gaining Access – Client Side Attacks

Introduction
Installing Veil 3.1
Veil Overview & Payloads Basics
Generating An Undetectable Backdoor Using Veil 3
Listening For Incoming Connections
Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10
Backdoor Delivery Method 1 – Using a Fake Update
Backdoor Delivery Method 2 – Backdooring Downloads on The Fly
How to Protect Yourself From The Discussed Delivery Methods

Gaining Access – Client Side Attacks – Social Engineering

Introduction
Maltego Basics
Discovering Websites, Links & Social Networking Accounts Associated With Target
Discovering Twitter Friends & Associated Accounts
Discovering Emails Of The Target’s Friends
Analysing The Gathered Info & Building An Attack Strategy
Backdooring Any File Type (images, pdf’s …etc)
Compiling & Changing Trojan’s Icon
Spoofing .exe Extension To Any Extension (jpg, pdf …etc)
Spoofing Emails – Send Emails As Any Email Account You Want
BeEF Overview & Basic Hook Method
BeEF – hooking targets using MITMf
BeEF – Running Basic Commands On Target
BeEF – Stealing Credentials/Passwords Using A Fake Login Prompt
BeEF – Gaining Full Control Over Windows Target
Detecting Trojans Manually
Detecting Trojans Using a Sandbox

Gaining Access – Using The Above Attacks Outside The Local Network

Overview of the Setup
Ex1 – Generating a Backdoor That Works Outside The Network
Configuring The Router To Forward Connections To Kali
Ex2 – Using BeEF Outside The Network

Post Exploitation

Introduction
Meterpreter Basics
File System Commands
Maintaining Access – Basic
Maintaining Access – Using a Reliable & Undetectable Method
Spying – Capturing Key Strikes & Taking Screen Shots
Pivoting – Theory (What is Pivoting?)
Pivoting – Exploiting Devices on The Same Network As The Target Computer

Website Penetration Testing

Introduction – What Is A Website ?
How To Hack a Website?

Website Pentesting – Information Gathering

Gathering Basic Information Using Whois Lookup
Discovering Technologies Used On The Website
Gathering Comprehensive DNS Information
Discovering Websites On The Same Server
Discovering Subdomains
Discovering Sensitive Files
Analysing Discovered Files

Website Pentesting – File Upload, Code Exec & File Inclusion

Discovering & Exploiting File Upload Vulnerabilities
Discovering & Exploiting Code Execution Vulnerabilities
Discovering & Exploiting Local File Inclusion Vulnerabilities
Remote File Inclusion Vulnerabilities – Configuring PHP Settings
Remote File Inclusion Vulnerabilities – Discovery & Exploitation
Preventing The Above Vulnerabilities

Website Pentesting – SQL Injection Vulnerabilities

What is SQL
Dangers of SQL Injection Vulnerabilities
Discovering SQL injections In POST
Bypassing Logins Using SQL injection Vulnerability
Discovering SQL injections in GET
Reading Database Information Finding Database Tables
Extracting Sensitive Data Such As Passwords
Reading & Writing Files On The Server Using SQL Injection Vulnerability
Discovering SQL Injections & Extracting Data Using SQLmap
The Right Way To Prevent SQL Injection

Website Pentesting – Cross Site Scripting Vulnerabilities

Introduction – What is XSS or Cross Site Scripting?
Discovering Reflected XSS
Discovering Stored XSS
Exploiting XSS – Hooking Vulnerable Page Visitors To BeEF
Preventing XSS Vulnerabilities

Discovering Vulnerabilities Automatically Using OWASP ZAP

Scanning Target Website For Vulnerabilities
Analysing Scan Results

Please note that we donot recommend students to just rely on a single certification for placement .We offer placement guarantee only with our Full Cyber security programs like Cloud Masters. HL-1 is good for working professionals who want to learn in-depth hacking as well as freshers who are looking for a hobby course. However today’s industry requirement is much more and one need to know many platforms to secure a good job in TOP MNC company.

Placement Training Process

Career Counseling

Personalized career pathing from experts which lead to futuristic career

Resume Writing

Craft your impressive resume under the guidance of experts

Interview Preparation

Receive technical booster session, interview preparation with one to one mock sessions.

Job Placement

200+ companies show trust in Networkers Home Quality of training and offers opportunity to thousands of our students.

Advantages of NH

Certified Mentors

Right guidance is what defines us,
A team of dedicated mentor drives
you for futuristic career.

Lab Instructors

At World class lab of Networkers Home,
student is trained by core professional lab trainers
who are available 24/7.

Free retake

Are you slow runner? Never Mind!
We have free retake sessions to
ignite your genius.

Boot Camps

Our live online boot camps for CCIE and various other course offerings, have taken off in popularity.We have pool of certified and experinced master trainers who delivers boot camps

100% Job Guarantee

We guarantee you 100% employment, post high end tech courses offered by us, we have designed industry integrated courses which enables not only IT graduates but also non-IT graduates to start a career as core network engineer

Student Success

We guarantee you 100% employment, post high end tech courses offered by us, we have designed industry integrated courses which enables not only IT graduates but also non-IT graduates to start a career as core network engineer.

Companies Our Students are Placed in

Students' Feedback

Aura BrooksCCNA

By far the best team I've ever worked with. They truly understood the look I was going for and completely nailed it! I would highly recommend them as a company, you simply just won't find any better team!

Eve Crawford

It was really fun getting to know the team during the project. They were all helpful in answering my questions and made me feel completely at ease. The design ended up being twice as good as I could have ever envisioned!

PremaCCIE

I'm wondering why I never contacted these guys sooner! Seriously, they all have commendable talent in their respective fields and knocked my concept out of the ballpark. Thanks for an amazing experience!

Zak ReidCCNP

Salient is by far the most astonishing WP theme out there! I literally could not be happier that I chose to buy your theme! Your regular updates and superb attention to detail blows me away every time I visit my new site!

Jake SmithCCIE Security

Salient is by far the most astonishing WP theme out there! I literally could not be happier that I chose to buy your theme! Your regular updates and superb attention to detail blows me away every time I visit my new site!