0% found this document useful (0 votes)
353 views24 pages

Ethical Hacking Master Classes

CodeGrills presents an ethical hacking master class course over 2 months with live online classes 4 times a week and assignments. The course covers topics like networking, Linux, footprinting, scanning networks, enumeration, vulnerability analysis, hacking web servers, bug hunting, system hacking, Android hacking, and sniffing. Students will learn programming languages like HTML, JavaScript, XML, and Python. The course is designed for beginners and intermediates to help them become professional ethical hackers.

Uploaded by

Deku Ignite
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
353 views24 pages

Ethical Hacking Master Classes

CodeGrills presents an ethical hacking master class course over 2 months with live online classes 4 times a week and assignments. The course covers topics like networking, Linux, footprinting, scanning networks, enumeration, vulnerability analysis, hacking web servers, bug hunting, system hacking, Android hacking, and sniffing. Students will learn programming languages like HTML, JavaScript, XML, and Python. The course is designed for beginners and intermediates to help them become professional ethical hackers.

Uploaded by

Deku Ignite
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

RE B

A WA

E
S AF
CodeGrills ! BE
E
Presents

Ethical
HACKING
Master
classes
Introduction

Searching for good ethical hacking courses, here you


come to team codegrills. Our team provides you all,
the best Courses through our R&D. Begginers as
well as intermediates can easily go through it to
develope their skills to a great level, We hereby
gonna help you all to grow your skills round the
clock, to be a professional ethical hacker and
developer, at very pocket friendly cost.

- Saurabh Kumar
(Cyber Security Researcher, Bug Hunter, Programmer)
STUDENT BENEFITS

Live Classes Learn Everything


Work on Live Projects Study Material


Practically & Assignments

Softwares Certificate EMI Option Lifetime Support


& Tools
Course Details
• Course Language:- Hindi
• Course Duration:- 2 Months
• Schedule: 4 Classes & 2 Assignment per Week
• Certificatin: Certificate of Completion
• Mode: Online Classes
• Eligibility: Atleast 8th Passed
YOU WILL ALSO

LEARN 4
PROGRAMMING LANGUAGES

HTML JavaScript XML Python


1. Networking 13. Denial-of-Service (DOS)

2. Linux 13. Wifi Hacking

3. Footprinting & Reconnaissance 14. Dark Web

4. Scanning Networks 15. Python Programming

5. Enumeration 16. Scripting

Syllabus 6. Vulnerability Analysis 17. Web Technologiessis

7. Hacking Web Servers 18. Termux

8. Bug Hunting / Website Hacking

9. System Hacking

10. Android Device Hacking


AL M
R 11. Sniffing
Y
ATU

FRIE

12. Social Engineering


N

N
D BE
(Networking)
________________________________________________________________

_____________________________________________
• Introduction to Networking • Threeway handshake

• Types of Networks • Network Services

• Ports & Protocols • Netsat

Course • IP Addressing

• MAC Addressing
• Accessing some ports (like
ftp, ssh, SMTP etc.)

Modules • Networking Devices


• Firewalls

• Topologies

• The OSI Model

RE B • TCP and UDP


A WA

E
S AF

• TCP/IP Model

E • SubNet Mask
! BE
(Linux)
________________________________________________________

• Getting Kali up & Running

• Accessing GUI

• Accessing Terminal
Course • File System
Modules • Basic Commands in Linux
• Networking Commands

• Services
RE B
A WA

• Managing Users
S AF

E • Security Tools Overview


! BE
(Footprinting & Reconnaissance)
________________________________________________________

• Footprinting Concepts

• Footprinting through Search Engines

• Google Hacking
Course • Footprinting through social Networks
Modules • Website Footprinting
• Whois

• DNS Footprinting
RE B
A WA

• Footprinting Tools
S AF

E • OSINT Framework
! BE
(Scanning Networks)
________________________________________________________

• Network Scanning Concepts

• Scanning Tools

Course • Host Discovery

Modules • Port and Service Discovery

• OS Discovery (Banner
Grabbing/OS Fingerprinting)
RE B
• Scanning Beyond IDS and Firewall
A WA

E
S AF

E
• Draw Network Diagrams
! BE
(Enumeration)
________________________________________________________

• Enumeration Concepts

Course • DNS Enumeration


Modules • OS Vulnerabilities Enumeration

• Roots Vulnerabilities Enumeration


RE B • Other Enumeration Techniques
A WA

E
S AF

E
! BE
(Vulnerability Analysis)
________________________________________________________

• Vulnerability Assessment Concepts

• Vulnerability Classification and


Assessment Types

Course • Vulnerability Assessment Solutions


and Tools
Modules
• Vulnerability Assessment Reports

• Hackathons
RE B
A WA

• CTFs
S AF

! BE
E • Bug Bounty Programs
(Hacking Web Servers)
________________________________________________________

• Web Server Concepts

• Web Server Attacks

Course • Web Server Attack Methodology


Modules • Web Server Attack Tools

• Countermeasures
RE B • Patch Management
A WA

E
S AF

• Web Server Security Tools


E
! BE
(Bug Hunting / Website Hacking)
________________________________________________________________

_____________________________________________
• Introduction to Bug Hunting • CORS

• SQL Injection • Business Logic Vulnerabilities


(Payment Gateway Bypass, Price
• Mail Spoofing Tampering)

• 10 Password Related Vulnerabilities


Course • Access Control Vulnerabilities

• Session Management • Server-Side Request Forgery (SSRF)

Modules • Clickjacking • Some Other Web Vulnerabilities

• XSS • Live Bug Hunting on Websites

• Broken Link Hijacking

RE B • Open Redirect
A WA

• Directory Listing
S AF

• Authentication Bypass(OTP Bypass


E etc.)
! BE
(System Hacking)
________________________________________________________

• System Hacking Concepts

• Gaining Access
Course • Attacks for Cracking and
Modules Bypassing System Passwords

• Escalating Privileges

RE B • Maintaining Access
A WA

E
S AF

• Clearing Logs
E
! BE
(Android Device Hacking)
________________________________________________________

• Android Remote Hacking

• Use RAT in Android

Course • Hacking Android Using RAT

Modules • FUD Method

(Sniffing)
________________________________________________________
RE B
• Sniffing Concepts
A WA

E
S AF

E • WireShark
! BE
(Social Engineering)
________________________________________________________

• Social Engineering Concepts

• Social Engineering Techniques


Course • Insider Threats
Modules • Impersonation on Social
Networking Sites

RE B • Identity Theft
A WA

E
S AF

• Countermeasures
E
! BE
(Denial-of-Service)
________________________________________________________

• DoS/DDoS Concepts

• DoS/DDoS Attack Techniques

Course • Botnets
Modules • DDoS Case Study

• DoS/DDOS Attack Tools


RE B • Countermeasures
A WA

E
S AF

• DoS/DDoS Protection Tools


E
! BE
(Wifi Hacking)
________________________________________________________

• Wifi hacking

• Wifi security

• Aircrack-ng, Airmon-ng and Airdump-ng

Course • Wifite

Modules (Dark Web)


________________________________________________________

• Introduction to DarkWeb

RE B • What is Tor?
A WA

E
S AF

• Browsing onion sites

! BE
E • Hacking Forums
(Python Programming)
________________________________________________________

• Introduction to Python

• Variables

• Data Types

Course • List

Modules • Tuples
• Dictionaries

• If else

RE B • Loops
A WA

• Libraries & Modules


S AF

! BE
E • Make own Hacking Tools
(Scripting)
________________________________________________________________

_____________________________________________
• Roadmap and Guide to Scripting
• Make Refer Bypass Script
• Basic understandigs of Scripting
• Make OTP Bypass Script
• Use of Scripting Tools
• Make Money Adder Script
• Convert ZIP Files to PHP Files
Course • Run PHP Files in Localhost
• Make Task Bypass Script

Modules • Capture SSL Data of any App


• Bonus

• Make Script's Link for Audience

• Start Earning Money as a Scripter

• Identify the Right SSL Data


RE B
A WA

• Display Response Message in the


S AF

Script

E • Send Response Data to the other


! BE pages
(Web Technologies)
________________________________________________________

• HTML

• JavaScript

Course • XML

Modules • Introduction to WordPress & Blogger

(Termux)
________________________________________________________
RE B
• Complete Termux Course
A WA

E
S AF

E • Hacking by Termux
! BE

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy