Ethical Hacking Training – Hacking Level -1

Ethical Hacking Training -Hacking Level-1 

Basic information:

Want to Study most Deep dive Ethical hacking certification available in Market .HL -1 is specially designed certification for freshers who are looking for building a solid career in Cyber security and ethical hacking Industry .Have a look at Course syllabus given below and you will understand the topics covered and depth provided in the program .HL-1 leads to Next level of Certification called HL-2  which is Penetration testing Certification .

  • HL-1 Training Fee: 8,500 + 18% GST = INR 10,030 (Indian Students)
  • HL-1 Training Fee: USD 350 (International Students)
  • HL-1 Training Duration: 4 Weeks (2 Hours a day)
  • HL-1 Training Duration: Fast Track Bootcamp (4 Days) (Not for freshers)
  • Online mode batches available
  • Batches Available in Weekdays (Mon-Fri) and Weekends (Sat, Sun)
  • Training delivered by Certified Professionals with enormous industry experience
  • For more details, Contact Us

HL-1 is one of the best hacking core training program for professionals who wants to build a career in advance network security as well as ethical hacking .Designed by Top Cyber Security experts in the world .HL-1 is level 1 certification which teaches you all basic theory concepts as well as hands on labs on Wired, Wireless ,Web and Network Hacking techniques .Checkout the Course syllabus below and you will find our program content as more deep dive and detailed as compared to any Ethical hacking certification in market . Designed for freshers ,program takes you into 17 different Modules 

Its a 4 -6 Weeks Part time Training program  covering the best and modern hacking tools used in professional hacking industry .You get following benefits with this certification

  • Top Industry experts Trainers
  • 100% Free Exam Voucher worth Rs 7500 or USD $150
  • Test Prep Guide
  • Toolkit for various labs
  • Study Guide -Printed copy
  • Industry recognition -Participation certification + Exam Voucher
  • 40% Discount voucher for HL-2 training and Exam Voucher
  • 100% Practical Job oriented training

This course will introduce students to the foundations and landscape of ethical hacking through both lecture and working in a virtual environment. The course will focus on basic penetration testing concepts such as reconnaissance and exploitation as well as introducing general security fields such as network, Web, and application security.

Course Content:

  • Course Introduction & Overview
  • What Is Ethical Hacking & Why Learn It ?
  • Lab Overview & Needed Software
  • Installing Kali 2018 As a Virtual Machine
  • Installing Metasploitable As a Virtual Machine
  • Installing Windows As a Virtual Machine
  • Creating & Using Snapshots
  • Basic Overview of Kali Linux
  • The Terminal & Linux Commands
  • Network Penetration Testing Introduction
  • Networks Basics
  • Connecting a Wireless Adapter To Kali
  • What is MAC Address & How To Change It
  • Wireless Modes (Managed & Monitor)
  • Enabling Monitor Mode Manually (2nd method)
  • Enabling Monitor Mode Using airmon-ng (3rd method)
  • Packet Sniffing Basics Using Airodump-ng
  • Targeted Packet Sniffing Using Airodump-ng
  • Deauthentication Attack (Disconnecting Any Device From The Network)
  • Creating a Fake Access Point (Honeypot) – Theory
  • Creating a Fake Access Point (Honeypot) – Practical
  • Gaining Access Introduction
  • WEP Cracking – Theory Behind Cracking WEP Encryption
  • WEP Cracking – Basic Case
  • WEP Cracking – Fake Authentication
  • WEP Cracking – ARP Request Replay Attack
  • WPA Cracking – Introduction
  • WPA Cracking – Exploiting WPS Feature
  • WPA Cracking – Theory Behind WPA/WPA2 Cracking
  • WPA Cracking – How To Capture The Handshake
  • WPA Cracking – Creating a Wordlist
  • WPA Cracking – Using a Wordlist Attack
  • Securing Your Network From The Above Attacks
  • How to Configure Wireless Security Settings To Secure Your Network
  • Introduction
  • Information Gathering – Discovering Connected Clients using netdiscover
  • Gathering More Information Using Autoscan
  • Gathering Even More Information Using Zenmap
  • MITM – ARP Poisoning Theory
  • MITM – ARP Spoofing using arpspoof
  • MITM – ARP Spoofing Using MITMf
  • MITM – Bypassing HTTPS
  • MITM – Session Hijacking
  • MITM – DNS Spoofing
  • MITM – Capturing Screen Of Target & Injecting a Keylogger
  • MITM – Injecting Javascript/HTML Code
  • MITM – Using MITMf Against Real Networks
  • Wireshark – Basic Overview & How To Use It With MITM Attacks
  • Wireshark – Sniffing Data & Analysing HTTP Traffic
  • Wireshark – Capturing Passwords & Cookies Entered By Any Device In The Network
  • Detecting ARP Poisoning Attacks
  • Detecting suspicious Activities Using Wireshark
  • Gaining Access Introduction
  • Introduction
  • Basic Information Gathering & Exploitation
  • Using a Basic Metasploit Exploit
  • Exploiting a Code Execution Vulnerability
  • MSFC – Installing MSFC (Metasploit Community)
  • MSFC – Scanning Target(s) For Vulnerabilities
  • MSFC – Analysing Scan results & Exploiting Target System
  • Nexpose – Installing Nexpose
  • Nexpose – How To Configure & Launch a Scan
  • Nexpose – Analysing Scan Results & Generating Reports
  • Introduction
  • Installing Veil 3.1
  • Veil Overview & Payloads Basics
  • Generating An Undetectable Backdoor Using Veil 3
  • Listening For Incoming Connections
  • Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10
  • Backdoor Delivery Method 1 – Using a Fake Update
  • Backdoor Delivery Method 2 – Backdooring Downloads on The Fly
  • How to Protect Yourself From The Discussed Delivery Methods
  • Introduction
  • Maltego Basics
  • Discovering Websites, Links & Social Networking Accounts Associated With Target
  • Discovering Twitter Friends & Associated Accounts
  • Discovering Emails Of The Target’s Friends
  • Analysing The Gathered Info & Building An Attack Strategy
  • Backdooring Any File Type (images, pdf’s …etc)
  • Compiling & Changing Trojan’s Icon
  • Spoofing .exe Extension To Any Extension (jpg, pdf …etc)
  • Spoofing Emails – Send Emails As Any Email Account You Want
  • BeEF Overview & Basic Hook Method
  • BeEF – hooking targets using MITMf
  • BeEF – Running Basic Commands On Target
  • BeEF – Stealing Credentials/Passwords Using A Fake Login Prompt
  • BeEF – Gaining Full Control Over Windows Target
  • Detecting Trojans Manually
  • Detecting Trojans Using a Sandbox
  • Overview of the Setup
  • Ex1 – Generating a Backdoor That Works Outside The Network
  • Configuring The Router To Forward Connections To Kali
  • Ex2 – Using BeEF Outside The Network
  • Introduction
  • Meterpreter Basics
  • File System Commands
  • Maintaining Access – Basic
  • Maintaining Access – Using a Reliable & Undetectable Method
  • Spying – Capturing Key Strikes & Taking Screen Shots
  • Pivoting – Theory (What is Pivoting?)
  • Pivoting – Exploiting Devices on The Same Network As The Target Computer
  • Introduction – What Is A Website ?
  • How To Hack a Website?
  • Gathering Basic Information Using Whois Lookup
  • Discovering Technologies Used On The Website
  • Gathering Comprehensive DNS Information
  • Discovering Websites On The Same Server
  • Discovering Subdomains
  • Discovering Sensitive Files
  • Analysing Discovered Files
  • Discovering & Exploiting File Upload Vulnerabilities
  • Discovering & Exploiting Code Execution Vulnerabilities
  • Discovering & Exploiting Local File Inclusion Vulnerabilities
  • Remote File Inclusion Vulnerabilities – Configuring PHP Settings
  • Remote File Inclusion Vulnerabilities – Discovery & Exploitation
  • Preventing The Above Vulnerabilities
  • What is SQL
  • Dangers of SQL Injection Vulnerabilities
  • Discovering SQL injections In POST
  • Bypassing Logins Using SQL injection Vulnerability
  • Discovering SQL injections in GET
  • Reading Database Information
  • Finding Database Tables
  • Extracting Sensitive Data Such As Passwords
  • Reading & Writing Files On The Server Using SQL Injection Vulnerability
  • Discovering SQL Injections & Extracting Data Using SQLmap
  • The Right Way To Prevent SQL Injection
  • Introduction – What is XSS or Cross Site Scripting?
  • Discovering Reflected XSS
  • Discovering Stored XSS
  • Exploiting XSS – Hooking Vulnerable Page Visitors To BeEF
  • Preventing XSS Vulnerabilities
  • Scanning Target Website For Vulnerabilities
  • Analysing Scan Results
  • Bonus Lecture – What’s Next?

Please note that we donot recommend students to just rely on a single certification for placement .We offer placement guarantee only with our Full Cyber security programs like Cloud Masters .HL-1 is good for working professionals who want to learn in-depth hacking as well as freshers who are looking for a hobby course . However today’s industry requirement is much more and one need to know many platforms to secure a good job in TOP MNC company .

  • Networkers Home Facebook
  • Networkers Home Youtube
  • Networkers Home Twitter
  • Networkers Home Linkedin
  • Networkers Home Googleplus