cyber security+ethical hacking+penetration testing Combo pack

cyber security+ethical hacking+penetration testing Combo pack

Ethical Hacking Tuition center

Trainer: Satish Tiwary (Cyber Security+Ethical Hacking +penetration Testing)

Cyber Security and Ethical Hacking Lab Setup :

Windows Installation inside VirtualBox
Linux (RedHat) Installation inside VirtualBox
Kali Linux Installation
Different Type of Network settings
Remote Support Through Virtualization
Virtualization extensions

Installation and Configuration of Virtualization Technology

Introduction to Cyber Security
Overview of Cyber Security
Internet Governance – Challenges and Constraints

Cyber Security Vulnerabilities and Cyber Security Safeguards

Cyber Security Vulnerabilities-Overview
vulnerabilities in software,Algorithm,Operating System and patches
System administration
Complex Network Architectures
Open Access to Organizational Data
Weak Authentication or Unprotected Broadband communications
Poor Cyber Security Awareness

Linux Essential (Red-hat Enterprise Linux)

Red Hat Enterprise Linux basics and it’s variants
Design Classroom Network Using Virtualization Technology For Lab Practice.
Virtual-box installation and configuration.
VirtualBox Network Adapter settings.
Vmware Installation and Configuration.
Vmware Network Adapter settings.
Linux Files and Folder.
Copying files and folders in Linux.
Moving and Renaming Files and Folders in Linux.
Determining File Content.
Creating Fake files with desired size.
Standard input/output to a file.
Searching files and Folders in Linux.
Vim editor
Nano Editor
Writing shell script in Linux.
samples of shell scripting with examples.
Scripting:for Loops
Scripting:if statements
Spell check with Aspell command line tool.
Permission Types in Linux.
Changing files and Folder Permissions.
Special Permissions for files and folders in Linux.
Changing User ownership and group ownership.
Symbolic and Numeric Method.
Soft Linking and hard Linking Files and Folders in Linux.
User and Group Management in Red Hat Enterprise Linux.
User management tools.
System users and groups.
Shell scripting for user management
shell scripting for user and group management
shell scripting for user and password management.
Different methods to Lock users in Linux.
Different Methods to Unlock Users in Linux.
Different methods to enable/Disable users in Linux.
Linux File System.
Partition creation and Deletion in Linux.
Linux File System Up-gradation and Degradation.
Swap Partition creation and Deletion.
Swap File Creation and Deletion.

Xinetd Managed Services in Red Hat Enterprise Linux.
Telnet server
Secure Telnet server
Telnet Proxy
Proxychain For Telnet
Service and Application Access Controls in Linux.
Initialization Script Management.
Package Management in Linux using RPM and YUM.
Yum Local and Remote Server.
Network Configuration and Management in Linux.
Forward Lookups and Reverse Lookups
Exploring DNS with HOST.
Network File Service Configuration and Management.

SSH security
Telnet Security
IP Based Security
Network based Security
Time Based Security
Connection Based Security
Load Balancing
Apache Server Security
Checksum and verification
Clear Cache memory
md5sum and sha1sum
generate audit reports
Audit report about Linux Users
Report about Configuration changes
Report about logins
Report about account modifications
Successful Logins
Login summary Report
Records of bad Login attempts


Basics of IPTABLES
Configuration file for IPTABLES
File settings for IPTABLES
Firewall services
Allow or Deny Incoming Request
Allow or Deny Outgoing Request
block or allow certain IP Address
block or allow certain network Address
Block all ICMP incoming traffic
Block or allow all FTP/HTTP incoming traffic
Create user defined chain
Delete user defined chain
Allow or Block particular PORT or service for particular IP Address or Network Address
Rename user defined chain
Log firewall rules
Backup or Restoring rules in iptables
MAC address level filtering
TCP/UDP Port Filtering
Block or Allow Particular service
Block or alow Particular Service for particular IP or Network.

Access control in cyber world
Audit network devices or Servers
Different Authentication methods
Bio-metrics System
Security policy
Threat Management.

Securing Web Application, Services and Servers
Introduction to web sites and web applications
Basic security for HTTP Applications and Services
Authorization Patterns
Security Considerations and it’s Challenges.

Intrusion Detection and Prevention methods
Physical Theft
Abuse of Privileges
Unauthorized Access by Outsider
Malware infection
Intrusion detection and Prevention Techniques
Anti-Malware software
Network based Intrusion detection Systems
Network based Intrusion Prevention Systems
Host based Intrusion prevention Systems
Security Information Management
Network Session Analysis
System Integrity Validation.

Cryptography and Network Security

Introduction to Cryptography, Symmetric key Cryptography, Asymmetric key Cryptography, Message Authentication, Digital Signatures,
Applications of Cryptography.

  1. AES(Advanced Entyption Standard)
  2. DES(Data Encryption Standard)
  3. RSA(Name of the creators).
  4. MD5(Message Digest -5)
  5. SHA(Secure Hash Algorithm)
  6. DSA Algorithm
  7. Private key Public key generation
    8.Self Signed Cetificate generation
    GPG Encryption Decryption
    ZIP file Encryption Decryption
    Vim security
    PGP Security
    Introduction to cryptography.
    cipher basics with labs
    Basic symmetric-key encryption
    symmetric-key labs
    Basics of Assymmetric-key encryption
    perfect secrecy
    Feistel networks, DES, 3DES, and AES.
    basic modes of operation: CBC and counter mode.

Overview of Firewalls

Types of Firewalls
User Management
VPN Security Security Protocols: – security at the Application Layer
Security at Transport Layer- SSL and TLS,
Security at Network Layer-IPSec.

Ethical hacking with Kali Linux and Penetration Testing

Install Kali Linux Graphically.
Setup Kali Linux Network Lab with Virtualization Technique.
Install Windows and RedHat Enterprise Linux as Client Machine.
Create and Configure a Bridge and Internal Network between all OS.
Files and Folder Creation ,Deletion and Renaming in Kali Linux.
Updating, Upgrading, Distro Understanding in kali Linux.
Kali Linux Administration.
Networking basics in Kali Linux.
Network Scanning in Kali Linux.
Network Monitoring in Kali Linux.
PostgreSQL Service
Metasploit configuration
Hack Telnet server using Metasploit
Hack SSH Server using Metasploit
HACK FTP Server using Metasploit
Hack HTTP/WEB Server using Metasploit
Metasploit and everything HTTP
Footprinting Concepts
• Footprinting Methodology
• Footprinting through Search Engines
• Footprinting through Web Services
• Footprinting through Social Networking Sites
• Website Footprinting
• Email Footprinting
• Whois Footprinting
• DNS Footprinting
• Network Footprinting
• Footprinting through Social Engineering
• Footprinting Tools
• Footprinting Countermeasures

Scanning Networks • Network Scanning Concepts
• Scanning Tools
• Host Discovery
• Port and Service Discovery
• OS Discovery (Banner Grabbing/OS
• Scanning Beyond IDS and Firewall
• Draw Network Diagrams

Enumeration • Enumeration Concepts

• NTP and NFS Enumeration
• SMTP and DNS Enumeration
• Other Enumeration Techniques (IPsec,
Unix/Linux, Telnet, FTP, TFTP, SMB, IPv6,
• Enumeration Countermeasures

Web Server Concepts
• Web Server Attacks
• Web Server Attack Methodology
• Web Server Attack Tools
• Web Server Countermeasures
• Patch Management
• Web Server Security Tools

gathering website info
discovering technologies used on the website
gathering DNS information
Discovering subdomains
discovering sensitive files
Analyzing Discovered Files
Browser Security
Chrome security
Firefox Security

Hacking With Kali Linux

Setup Client Machines and Targets for Hacking.
Hacking FTP using Hydra.
Hacking SSH using Hydra.
Hacking WEB Services using Hydra.
Database Hacking and Password Attacks using Kali Linux
Learn to Download and use Dictionary attack.
Port Scanning using Nmap
IP and Network Scanning
DNS Footprinting
DNS Enumeration
Hacking facebook using Social Engineering
Hacking Gmail using Social Engineering
Zen map tool
Harvestor usage
Generating Word list for hacking
information gathering using dmitry tool
information gathering using netdiscover
information gathering using sparta
Password Attacking through Hydra
Password Attacking through Medusa
Password Attacking through John
Password Attacking through Crunch
Password Attacking through Cewl
Scanning Web Application and web sites using wpscan
Scanning Web Application and web sites using cmseek
Website Information Gathering
Scan Website Vulnerability
Nikto (Website Information Gathering Tool)
Understand Hashing Algorithm
Crack Hash Algorithms
WordPress Security Scanner
Finding emails for Hacking
Learn Wireshark Tool
Learn Tshark Network Monitoring Tool
System Security using Kali Linux.
Encrypt File and Folder using Kali Linux.
Openssl tool for cryptography
gpg- encryption
Vim Editor Security.
Hide your Real IP from Hackers.
Security Audit using Lynis (Automated Security Testing)
rootkit Scanning
Antivirus installation and usage in Kali Linux.
Encrypting Encrypting ZIP file.
Hiding text inside Images
Cyber Forensic using Windows