Complete hands-on workshops & individual mentoring.
A certificate with a unique number
30 % Theory, 60 % training, 10% implementation. Get trained by industry experts.
Training materials & manual for you to follow along. Work on real examples and case study scenarios. Coffee breaks with beverages.
Discounts on all subsequent training from Aatralz
The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organisation. As we put it, to beat a hacker, you need to think like a hacker.
Lesson 01: Hackers and its Terminologies
Lesson 02: Types of Hackers
Lesson 03: Difference between Ethical Hacker & Hacker
Lesson 04: Threat vs Vulnerability vs Risk
Lesson 05: What is Penetration Testing?
Lesson 06: Why Penetration Testing?
Lesson 07: Penetration Testing Methodology
Lesson 08: Phases of Penetration Testing
Lesson 01: Cyber Law
Lesson 02: Legal Penalties
Lesson 03: Case Studies
Lesson 01: Introduction
Lesson 02: Network Terminologies
Lesson 03: IP Addresses
Lesson 04: Ports & Protocols
Lesson 05: Routing & Switches
Lesson 01: What is Footprinting?
Lesson 02: Footprinting Terminologies
Lesson 03: Real-World Information Intelligence Techniques
Lesson 04: Additional Footprinting Tools
Lesson 05: Footprinting Countermeasures
Lesson 06: Footprinting Penetration Testing
Lesson 01: What is Scanning?
Lesson 02: Types of Scanning
Lesson 03: Network Scanning using Nmap& Hping3
Lesson 04: Scanning Techniques
Lesson 05: Vulnerability Scanning using Nessus
Lesson 06: Additional Scanning Tools
Lesson 07: Scanning Countermeasures
Lesson 08: Scanning Pen Testing
Lesson 09: What is Enumeration?
Lesson 10: SNMP Enumeration
Lesson 11: Banner Grabbing(OS Fingerprinting)
Lesson 12: Enumeration Countermeasures
Lesson 13: Enumeration Pen Testing
Lesson 01: What are Proxy Servers?
Lesson 02: Types of Proxy Servers
Lesson 03: Why Attackers use Proxy Servers?
Lesson 04: Surface Web vs Deep Web
Lesson 05: TOR(The Onion Routing)
Lesson 06: Proxy Tools
Lesson 07: Online Proxy
Lesson 08: HTTP & SSH Tunneling
Lesson 09: IP Spoofing
Lesson 01: Password Cracking
Lesson 02: Password Complexity
Lesson 03: Password Cracking Techniques
Lesson 04: Types of Password Attacks
Lesson 05: Password Sniffing
Lesson 06: Brute Force Attack
Lesson 07: Dictionary Attack
Lesson 08: Hybrid Attack
Lesson 09: Syllable Attack
Lesson 10: Rule-Based Attack
Lesson 11: Manual Password Guessing
Lesson 12: Default Passwords
Lesson 13: Cain Abel
Lesson 14: LOphtCrack
Lesson 15: Ophcrack
Lesson 16: Password Cracking Tools
Lesson 17: Salting
Lesson 18: Password Cracking Countermeasures
Lesson 19: What is Privilege Escalation?
Lesson 20: Privilege Escalation Tools
Lesson 21: Keylogger
Lesson 22: Types of Key Loggers
Lesson 23: Hardware Keylogger
Lesson 24: Software Keylogger
Lesson 25: Spyware
Lesson 26: Types of Spywares
Lesson 27: Desktop Spyware
Lesson 28: Email & Internet Spyware
Lesson 29: GPS Spyware
Lesson 30: How to defend against Key Loggers & Spywares?
Lesson 31: Rootkits
Lesson 32: Steganography
Lesson 33: Steganalysis
Lesson 34: Covering Tracks
Lesson 35: System Hacking Penetration Testing
Lesson 01: Introduction to Virus, Worms & Trojans
Lesson 02: Trojan Construction Kit
Lesson 03: Evading Anti-Virus Techniques
Lesson 04: Indication of Trojan & Virus Attack
Lesson 05: Difference between Virus & Worms
Lesson 06: Online Malware Testing
Lesson 07: Countermeasures
Lesson 08: Penetration Testing
Lesson 01: What is Social Engineering?
Lesson 02: Types of Social Engineering
Lesson 03: Phishing IQ Test
Lesson 04: Countermeasures
Lesson 05: Penetration Testing
Lesson 01: DOS & DDOS
Lesson 02: Sniffing Attacks
Lesson 03: Types of Sniffing Attacks
Lesson 04: Man in Middle Attack
Lesson 05: Wireshark Tool Demonstration
Lesson 06: ARP Poisoning Attacks using Cain Abel
Lesson 07: Countermeasures
Lesson 08: Penetration Testing
Lesson 01: Introduction to Web Applications
Lesson 02: Web Application Components
Lesson 03: How Web Applications Work?
Lesson 04: Web Application Architecture
Lesson 05: Web Application Vulnerabilities
Lesson 01: Introduction to the Wireless Technologies
Lesson 02: Types of Authentication
Lesson 03: Different Types of Attacks
Lesson 04: Cracking WEP & WPA Encryption
Lesson 05: Wi-Fi Router Password Cracking
Lesson 06: Wireless Hacking Countermeasures
Lesson 07: Penetration Testing
Lesson 01: Cloud Computing Basics
Lesson 02: Cloud Computing Threats
Lesson 03: Clouds Model
Lesson 04: Virtualizations
Lesson 05: Cloud Security
Lesson 06: Cloud Penetration Testing
99%
Participants declare that they would recommend us to their friends
Go to training with your friends and get a discount on enrollment! With a group purchase of a minimum of 3 entries for the training you will pay 10% less.
Invite your friends:
On Facebook
On LinkedIn
044 42343939 hello@aatralz.com