UrduCourses

(4.9) 68 ratings
4.9/5

Ethical Hacking Pentesting Complete Course in Pakistan Online

In this course you will learn about introduction to ethical hacking along with all other 19 modules including footprinting and reconnaissance, hacking mobile platforms, system hacking, sesion hacking and many more

Only 4 Seats Left

PKR 4,999

Regular Price

PKR 2,499

Full Course Fee

Who is this for?

What You Will Learn

Prerequisites

SYLLABUS

WEEK 1

Introduction to Ethical Hacking

  • What is ethical hacking?
  • Threats
  • Different attack types
  • How to defend
  • Manage breaches
  • Policies of security
  • Installing Kali Linux on Windows 10
  • Using Kali Linux tools
  • Resetting Kali
  • Information gathering introduction

Protection

  • Protecting your data
  • Data standards
  • COBIT
  • Vulnerabilities
  • Penetration testing
  • Concepts of hacking

WEEK 2

Footprinting & Reconnaissance

  • Gathering information about target
  • Using intelligence
  • Google hacking
  • Going social
  • Phone number record search
  • Tracking target
  • Using emails
  • Website mirror
  • Monitor a website
  • Investigate via email

Reconnaissance Tools

  • Mining data using AI
  • DNS Footprinting
  • DNG explained
  • Ping and Tracert
  • nslookup
  • countermeasures
  • pen testing reports

WEEK 3

Kali Linux Lab Setup

  • How virtualization works?
  • Lab setup
  • Installing virtual box
  • Getting Metasploitable
  • Installing Linux operating system
  • Installing Windows virtual machine

Introduction to Kali Linux

  • Kali Linux interface walkthrough
  • Terminal window
  • Updating Kali Linux
  • Favorites in Kali Linux
  • Using Kali Linux for information gathering
  • Deepmagic
  • Active target
  • OpenVAS
  • Nikto
  • Burp Suit

Password Cracking

  • Password recovery
  • Breaking windows password
  • Dictionaries for password cracking
  • Exploitable Linux

WEEK 4

Scanning Networks

  • Scanning techniques
  • IPv6 scans
  • Port scanning
  • Handshakes
  • TCP flags
  • Query DNS
  • Using Nmap
  • Vulnerability scanning
  • Free scanners

Scanning Tools & Spoofing

  • hping
  • NetScan
  • IP fragmentation
  • Staying anonymous while hacking
  • Hiding using TOR
  • Using proxies
  • IP spoofing
  • HTTP & SSH

WEEK 5

Enumeration

  • Enumeration explained
  • Profile windows host
  • Profile Unix host
  • Windows network interface
  • Linux network interface
  • NetBIOS
  • SMB
  • SAMBA
  • Using RPC
  • Enumerating SMB from Linux
  • Enumerating SMB from Windows
  • SNIMP enumeration
  • Using finger

Advanced Enumeration

  • Enumerating webpages
  • Finding hidden webpages
  • Database enumeration
  • Tracing routes
  • Shodan
  • ZMap
  • SMTP users
  • LDAP
  • SuperScan
  • NetScan Tools Pro

WEEK 6

Vulnerability Analysis

  • What is vulnerability analysis
  • Assessing vulnerabilities
  • Vulnerability management
  • Common vulnerabilities
  • Man in the middle vulnerability analysis
  • Bug bounty
  • How mobile devices are hacked
  • Fuzz testing
  • LAN scanners
  • Firewalls

WEEK 7

System Hacking

  • Gaining access to systems
  • Rainbow tables
  • Defending password attacks
  • Escalating privileges
  • Defending privilege escalation
  • What are spyware
  • Different spyware
  • Spying a cell phone
  • Defending spyware

Keyloggers & Hiding Them

  • Comparing keyloggers
  • Actual Spy
  • Keylogger for MacOS
  • Steganography
  • Detecting steganography
  • Disabling logging

WEEK 8

Malware Threat

  • What is malware?
  • Types of malware
  • Malware delivery method
  • Virus construction
  • Malware construction
  • Malware botnets
  • Detecting malware
  • Signs of compromise
  • Sandboxing explained
  • Using sandbox

Advance Techniques

  • How hiding malware works
  • Malware spots
  • Polymorphic malware
  • Ransomware
  • Advanced threats
  • Sodin
  • Reverse engineering
  • Malware analysis
  • Packet analyzation
  • Ghidra

WEEK 9

Sniffing

  • What is sniffing
  • Sniffing traffic
  • Passive attacks
  • Active attacks
  • Tapping data stream
  • IPv4 vs IPv6
  • macof attack
  • Exploiting protocols
  • Spoofing MAC address
  • MAC attacks
  • DHCP
  • Depleting DHCP pool
  • DHCP attacks

Diving Deep in Sniffing

  • Address Resolution Protocol
  • Ettercap
  • ARP attacks
  • ARP poison
  • ARP spoofing
  • Domain Name System
  • Forgery
  • OmniPeek
  • Sniffing tools
  • Using Wireshark
  • TShark
  • Packet sniffing

WEEK 10

Social Engineering

  • What is social engineering?
  • Hacking victim with your charm
  • Social engineering browser
  • Social media manipulation
  • Insider attacks
  • How hackers steal faces

SET in Kali Linux

  • Social-engineer toolkit
  • Spam
  • Phishing attacks
  • Hacking in person
  • Hacking on phone
  • Email and websites

WEEK 11

Denial of Service

  • What is denial of service
  • Using Python
  • TCP SYN flooding
  • Reflection attack
  • Using LOIC
  • NTP
  • Using memcached
  • Deauthenticating wireless host

Advance DDoS Techniques

  • Flooding HTTP
  • GoldenEye
  • Testing webapps
  • OWASP SwitchBlade
  • BlackEnergy
  • FTP service
  • RangeAMP attacks
  • SIP server
  • Ransomware explained
  • Petya
  • Cryptolocker
  • Defeating DDoS
  • PeerShark
  • NIST
  • IoT DDoS

WEEK 12

Session Hijacking

  • What is session hijacking
  • WebSocket
  • What are web sessions
  • Hacking Telnet session
  • Real world hijacking
  • Internet banking
  • man-in-the-browser
  • man-in-the-middle
  • Stripping SSL
  • Hijacking via cookies
  • Subterfuge
  • Web proxies

Advance Session Hijacking Tools

  • Zed Attack Proxy
  • Using Cain
  • Hijacking SSH session
  • Hijacking cars and drones
  • Cloud hijacking

WEEK 13

Evading IDS, Firewalls & Honeypots

  • How firewalls work?
  • Windows firewall
  • Firewall logs
  • IPTables
  • Setup firewall
  • Firewall builder
  • PIX firewall
  • Installing GNS3
  • Set up network

Advance Evading Methods

  • xListing
  • Snorting rules
  • Security Onion
  • EINSTEIN
  • Cowrie honeypot
  • WSO2 gateway
  • WAF
  • Evading antivirus detection
  • MSFvenom
  • Packaging a software
  • Fileless attacks
  • Staying undetected

WEEK 14

Hacking Web Servers

  • OWASP
  • What are cookies?
  • WebGoat Server
  • Bank application
  • WebScarab
  • HTML introduction
  • HTTPS protocol
  • Google QUIC protocol

Hacking Web Application

  • Hijacking sessions with cookies
  • Manipulating URL
  • Cross-site scripting
  • Uniscan
  • Online banking sites
  • Web security Dojo

WEEK 15

SQL Injection

  • Important SQL concepts
  • SQL injection explained
  • SQL injection attack
  • Attack with SQLMap
  • Defend network layer
  • Defend application layer
  • Defend database layer

WEEK 16

Hacking Wireless Networks

  • Wireless networks explained
  • Wireless network testing
  • Understanding WPS
  • Extracting passwords
  • Aircrack-ng
  • WiFite
  • Pixiedust
  • WPA3
  • Dragonblood
  • Wi-Fi pineapple installation

Bluetooth & Tools

  • How Bluetooth works?
  • Scanning Bluetooth devices
  • Attacking Bluetooth connected devices
  • Wi-Fi cracker
  • Discovering networks
  • Heat mapping
  • Wi-Fi sniffing
  • Vistumbler

WEEK 17

Hacking Mobile Platforms - Android

  • Understanding mobile vulnerabilities
  • Static analysis
  • Dynamic analysis
  • How Android operating system works
  • Android testing
  • Extracting manifest file
  • JavaScript code
  • Java source code
  • ADB access
  • Android emulator
  • Setting up VM

Hacking Mobile Platforms - IOS

  • How iOS work?
  • iOS operating system weaknesses
  • Securing iOS
  • iOS Jailbreaking
  • Testing iOS apps
  • Class headers
  • iOS executable code
  • Dynamic analysis of iOS

WEEK 18

IoT & IoT Hacking

  • How IoT works?
  • IoT protocols
  • Communication model
  • IoT attacks
  • IoT hacking
  • Securing IoT devices

WEEK 19

Cloud Computing

  • Cloud computing security
  • Identity management
  • Create users
  • MFA
  • RBAC
  • Cloud deployment
  • Hacking process
  • Cloud computing threats

Hardening the Cloud

  • Encryption
  • Force HTTPS
  • Machine learning
  • Cloud DDoS protection
  • Cloud penetration testing
  • Cloud firewalls
  • Cloud storage replication
  • Cloud virtual machine
  • Load balancing

WEEK 20

Cryptography

  • Cryptography explained
  • Ciphers
  • Symmetric encryption
  • Asymmetric encryption
  • Hashing
  • PKI
  • Signing
  • Encrypting file system
  • Cryptography attacks
  • Exam expectations

GET FREE DEMO CLASS

Start Learning Today

“An investment in knowledge pays the best interest”

Open chat
Need Help?
Scan the code
How Can We Help You?
Compare Products
Action Add Product
Image
Title
Price
Stock Status
Quantity
Add To Cart
Review
CyberSavvy: Navigating Linux & Essential Cybersecurity
0 customer review
0.00
CEH Complete Training in 2 Installments
0 customer review
5,000.00
CyberStart: Learn Ethical Hacking from Scratch
0 customer review
1,999.00
Placeholder
easypaisa test
0 customer review
10.00
Freelancer Bundle
0 customer review
4,997.00
Developer Bundle
0 customer review
4,997.00
Ethical Hacker Bundle
0 customer review
0.00
Social Media Advertising Complete Course
0 customer review
3,999.00
WordPress Website Development Course In Pakistan
0 customer review
2,999.00
Ethical Hacking For Complete Beginners
0 customer review
999.00