CERTIFIED ETHICAL HACKER (CEH) & COMPTIA PENTEST+

SOME THEORIES + SOME PRACTICAL –  Fee 30 Thousand  Rupees (Course of 40 Hours, 2 Hour each day, 5 days a week. Total One Month Course)

I will conduct below course content. You need Laptop/Computer with atleast 8GB RAM. You need to install Virtualbox on your computer. On virtualbox we will install Kali Linux, Metasploitable2 vm, Window 2012/19 trial version, OWASPBWA vm, etc. I will help to install and setup all tools so don’t worry

You need atleast Admin/User level knowledge on OS or I can cover it with other topics. I will start from basics. You can ask as many time you want. Main purpose of training is to understand concepts and be Independent to do practical.

YouTube Demo Link on CEH/Pentest : https://www.youtube.com/watch?v=bh-7qR-ZmpQ

1. Overview of CEH

2. Basics of Ethical Hacking/Technical Foundation of hacking

3. Footprinting, Reconnaissance, Scanning: Information Gathering for the Ethical Hacker – DNS Recon, google dork, whois, nmap, port discovery, hping, etc,

4. Enumeration – Enumeration of SNMP ,SMB, Netbios, RPC,SMTP,NTP, FTP,etc Bruteforce Password cracking, Windows security overview, Linux Authentication, etc

5. Social Engineering, Malware Threat and Vulnerability Analysis – Phishing, Pharming, Malvertising, Spear Phishing ,SMS Phishing, Malware Threat – Worm and Virus Overview, Vulnerability Analysis – Openvas, Nessus, Qualys,etc overview.

6.Sniffing, Session Hijacking And Denial of Service – Acitve & Passive sniffers with attacks like ARP cache poison, MAC flood, Rough DHCP, Spoofing, DNS Poision,etc. Wireshark, TCP/HTTP Session Hijacking

7. Web-Based Hacking: Servers, Applications & Database – HTTP Protocol, nmap & netcat, Directory Travel, SQL Injection, Cross Site Scripting, Parameter Pollution, CSRF attack, sqlmap, nikto etc

8. Wireless Network Hacking – Wireless Basics, WEP related attacks, Evil Twin, Rougue Access Point, Aircrack-ng, etc

9. Evading IDS, Firewall Honeypots – IDS type, Session Splicing, Shellcode attack, Flooding, HTTP tunneling ,fragroute, scapy, tcpreplay,firewallk, etc

10. Cryptography Attack & Defence – Encryption Algorithm, Public Key Infrastructure, Email and Disk Encryption Cryptography attack – hydra hashcat John the ripper, SSH, IPSEC

11. Cloud, IOT and Botnets – Cloud attacks, IOT attacks and Botnets types

You can take CEH/Certifired ethical hacker certificate guide 4th edition by Omar Santos, Michael Gregg published by Pearson IT certifications as reference book. I will share some digital material which is advance and detailed and also try to cover other tools practical which is not in this book.

I will share ebooks on CEH and Pentest+ in this training.

You can contact me here also

← Back

Thank you for your response. ✨