Integrated Ethical Hacking

Ethical Hacking Tuition Center Jaipur

 Satish Tiwary(Trainer)

 Ethical Hacking and Cyber Security Complete Integrated Training Modules

Complete Training Duration up to 115 hrs

Ethical Hacking Tuition Center Jaipur

Integrated Ethical Hacking Training

Online Training by satish Tiwary (Ethical Hacking Tuition Center)

System Requirements For Cyber Security and Ethical Hacking Lab:

  • 8 GB (Gigabytes) of RAM or higher (16 GB recommended)/No Graphics card Required
  • 64-bit system processor is mandatory
  • 20 GB or more disk space
  • Enable virtualization technology on BIOS settings, such as “Intel-VTx”
  • Modern Browsers like Google Chrome (latest), Mozilla Firefox (latest), Microsoft Edge (latest) and Skype
  • All items referenced in this course are either free or is available on my blog
  • A computer  or Laptop for installing all the free software and tools needed to practice
  • A strong desire to understand hacker tools and techniques
  • Be able to download and install all the free software and tools needed to practice
  • A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world
  • Headphone with Mic  and an Internet connection of at least 2mbps

Cyber Security and ethical Hacking Lab Setup :

Installation and Configuration of Virtualization Technology

Windows Installation inside VirtualBox
Linux (RedHat) Installation inside VirtualBox
Kali Linux Installation
Different Type of Network settings
Remote Support Through Virtualization
Virtualization extensions

Windows Operating System:

Basics of Windows
File and Folder Management in Windows
User Management in Windows
Disk Management
File and Folder Security
Disk Security
USB Security
Registry Editor
Group Policy Editor
Network Setup and Testing
Information gathering
Processor Hacking
Memory Management in Windows(virtual memory)
Malware Detection
System Performance
System Monitoring
Windows Password Hacking and Bypass
Virtual hard Disk
Encrypting Virtual Hard Disk

Virtual Machines

Virtual Machine Weaknesses

Virtual Machine Hardening

Whonix OS – Anonymous Operating system

Whonix OS – Weaknesses

Qubes OS
Goals and Learning Objectives
The Importance of Patching
Windows 7 – Auto Update
Windows 8 & 8.1 – Auto Update

Windows 10 – Auto Update
Windows – Criticality and Patch Tuesday
Windows 7, 8, 8.1 & 10 – Automate the pain away from patching
Linux – Debian – Patching
Mac – Patching
Firefox – Browser and extension updates
Chrome – Browser and extension updates
IE and Edge – Browser and extension updates
Removing Privilege

Windows 7 – Not using admin
Windows 8 and 8.1 – Not using admin
Windows 10 – Not using admin

Auto updates – The Impact to privacy and anonymity

Security Domains, Isolation and Compartmentalization

CCNA Training Modules:

Introduction to computer Network

network Attacks

What is “Protocol”

Reference Models

OSI Reference Model


Demonstration using Wireshark

Standards & Protocols

Ethernet: Principles, Frame & Headers

ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets

ARP Hand-On Practices

VLANs – Virtual Local Area Networks

WLANs – Wireless Local Area Networks

Introduction to Network Layer

Internet Protocol – IP

IPv4 Adressing System

IPv4 Packet Header

IPv4 Subnetting: Classful Networks

IPv4 Subnetting: Subnet Mask

IPv4 Subnetting: Understanding
IPv4 Shortage
Private Networks
Private Networks – Demonstration

NAT – Network Address Translation

IPv6, Packet Header & Addressing

DHCP – How the Mechanism Works

ICMP – Internet Control Message Protocol


Introduction to Transport Layer

TCP – Transmission Control Protocol

TCP Header

UDP – User Datagram Protocol

Introduction to Application Layer

DNS – Domain Name System

HTTP ( Hyper Text Transfer Protocol )


TCP/IP Model and Internet

Introduction to Cisco Packet Tracer
Understand Network Topology
Understand wires and cables used in networking
Difference between Hubs- switches and Routers
IP Address brief
Types of Address
IPV4 addressing
binary conversion
Network Architecture
understand DHCP server working
Understand DNS Server working
Understand FTP Server working
Understand SMTP and POP3 Server working
Understand NTP Server working
Understand HTTP and HTTPS Server working
Understand Syslog Server working
 Router Components
Components of routers
Introduction to cisco IOS
IOS Modes on Cisco Devices
User EXEC mode
Privileged EXEC mode
Configuration mode
Interface Configuration mode
• Line Configuration mode
• Router Configuration mode
Enable Passwords
Line Passwords and Configuration
assign an IP address to an interface:
Assign secondary ip address on an Interface
Managing Configuration Files
view the contents of the running-config and startup-config files
delete the contents of the startup-config file:
change the host name of your router
assign a description to an interface for documentation purposes
create a banner message which users will see when logging into an IOS device
Need of routing
Routing Configuration
Routing very basic Lab
Static Routing Configuration
Default Routing Configuration
Static with Default Routing with configuration
Router Loopback Interfaces
Dynamic Routing
Difference between Static and Dynamic routing
RIP Routing Configuration
RIPv1 and RIPv2
EIGRP Configuration Lab
EIGRP configuration with same AS value
EIGRP Configuration with different AS Value
OSPF Configuration basic Lab
OSPF configuration with single AREA
OSPF Configuration with Multi Area or Multi Area OSPF Lab
Router as a DHCP server
Router as a DHCP Client
Router as a Multiple DHCP Server
Switch Basics
Assign IP Address on Switch
Gateway IP on Switch
VLAN creation and Deletion on SWITCH
Multi user Lab using SWITCH
Telnet Configuration on switch
SSH configuration on switch
enable password on switch
enable secret on switch
service password-encryption
Password Authentication Protocol configuration
CHAP configuration
ACL Configuration Lab
NAT configuration Lab
Removing IP Address from router Interfaces
Remove wrong Routing Configuration From router
Router Configuration Backup  and Restore using TFTP Server
Router Configuration Backup  and Restore using FTP Server

Linux Essential (Red-hat Enterprise Linux)

Red Hat Enterprise Linux basics and it’s variants
Design Classroom Network Using Virtualization Technology For Lab Practice.
Virtual-box installation and configuration.
VirtualBox Network Adapter settings.
Vmware Installation and Configuration.
Vmware Network Adapter settings.
Linux Files and Folder.
Copying files and folders in Linux.
Moving and Renaming Files and Folders in Linux.
Determining File Content.
Creating Fake files with desired size.
Standard input/output to a file.
Searching files and Folders in Linux.
Vim editor
Nano Editor
Writing shell script in Linux.
samples of shell scripting with examples.
Scripting:for Loops
Scripting:if statements
Spell check with Aspell command line tool.
Permission Types in Linux.
Changing files and Folder Permissions.
Special Permissions for files and folders in Linux.
Changing  User ownership and group ownership.
Symbolic and Numeric Method.
Soft Linking and hard Linking Files and Folders in Linux.
User and Group Management in Red Hat Enterprise Linux.
User management tools.
System users and groups.
Shell scripting for user management
shell scripting for user and group management
shell scripting for user and password management.
Different methods to Lock users in Linux.
Different Methods to Unlock Users in Linux.
Different methods to enable/Disable users in Linux.
Linux File System.
Partition creation and Deletion in Linux.
Linux File System Up-gradation and Degradation.
Swap Partition creation and Deletion.
Swap File Creation and Deletion.

Linux Server Configuration   Labs

Xinetd Managed Services in Red Hat Enterprise Linux.
Telnet server
Secure Telnet server
Telnet Proxy
Proxychain For Telnet
Service and Application Access Controls in Linux.
Initialization Script Management.
Package Management in Linux using RPM and YUM.
Yum Local and Remote Server.
Network Configuration and Management in Linux.
Forward Lookups and Reverse Lookups
Exploring DNS with HOST.
Network File Service Configuration and Management.
NFS Server and NFS Clients and it’s utilities.
Samba service configuration and management.
TFTP Server Configuration
Uploading and Downloading Files through TFTP
File Transfer Protocol Configuration and Management.
Printer Configuration in Linux.
Apache Server configuration in Linux.
Apache Namespace configuration in Linux.
Virtual Hosting.
Proxy server Configuration for Your Web Server
Simple Mail Transfer Protocol Configuration and Management.
Squirrelmail and PHP.
Incoming sendmail configuration and outgoing sendmail configuration.
Postfix mail server configuration.
Dovecot configuration.
Web Based Mailing Service Live Project.
OpenSSH Server configuration
scp:secure file transfer
Finger Server Configuration
Chat Server

Server Security labs :

SSH security
Telnet Security
IP Based Security
Network based Security
Time Based Security
Connection Based Security
Load Balancing
Apache Server Security
Checksum and verification
Clear Cache memory
md5sum and sha1sum
generate audit reports
Audit report about Linux Users
Report about Configuration changes
Report about logins
Report about account modifications
Successful Logins
Login summary Report
Records of bad Login attempts


Basics of IPTABLES
Configuration file for IPTABLES
File settings for IPTABLES
Firewall services
Allow or Deny Incoming Request
Allow or Deny Outgoing Request
block or allow certain IP Address
block or allow certain network Address
Block all ICMP incoming traffic
Block or allow all FTP/HTTP incoming traffic
Create user defined chain
Delete user defined chain
Allow or Block  particular PORT or service for particular IP Address or Network Address
Rename user defined chain
Log firewall rules
Backup or Restoring rules in iptables
MAC address level filtering
TCP/UDP Port Filtering
Block or Allow Particular service
Block or alow Particular Service for particular IP or Network.

Ethical hacking with Kali Linux and Penetration Testing

Install Kali Linux Graphically.
Setup Kali Linux Network Lab with Virtualization Technique.
Install Windows and RedHat Enterprise Linux as Client Machine.
Create and Configure a Bridge and Internal Network between all OS.
Files and Folder Creation ,Deletion and Renaming in Kali Linux.
Updating, Upgrading, Distro Understanding in kali Linux.
Kali Linux Administration.
Networking basics in Kali Linux.
Network Scanning in Kali Linux.
Network Monitoring in Kali Linux.
PostgreSQL Service
Metasploit configuration
Hack Telnet server using Metasploit
Hack SSH Server using Metasploit
HACK FTP Server using Metasploit
Hack HTTP/WEB Server using Metasploit
Metasploit and everything HTTP

Footprinting Concepts
• Footprinting Methodology
• Footprinting through Search Engines
• Footprinting through Web Services
• Footprinting through Social Networking Sites
• Website Footprinting
• Email Footprinting
• Whois Footprinting
• DNS Footprinting
• Network Footprinting
• Footprinting through Social Engineering
• Footprinting Tools
• Footprinting Countermeasures

Scanning Networks • Network Scanning Concepts
• Scanning Tools
• Host Discovery
• Port and Service Discovery
• OS Discovery (Banner Grabbing/OS
• Scanning Beyond IDS and Firewall
• Draw Network Diagrams

Enumeration • Enumeration Concepts

• NTP and NFS Enumeration
• SMTP and DNS Enumeration
• Other Enumeration Techniques (IPsec,
Unix/Linux, Telnet, FTP, TFTP, SMB, IPv6,
• Enumeration Countermeasures

Web Server Concepts
• Web Server Attacks
• Web Server Attack Methodology
• Web Server Attack Tools
• Web Server Countermeasures
• Patch Management
• Web Server Security Tools

gathering website info
discovering technologies used on the website
gathering DNS information
Discovering subdomains
discovering sensitive files
Analyzing Discovered Files
Browser Security
Chrome security
Firefox Security

Hacking With Kali Linux
Setup Client Machines and Targets for Hacking.
Hacking FTP using Hydra.
Hacking SSH using Hydra.
Hacking WEB Services using Hydra.
Database Hacking and Password Attacks using Kali Linux
Learn to Download and use Dictionary attack.
Port Scanning using Nmap
IP and Network Scanning
DNS Footprinting
DNS Enumeration
Hacking facebook using Social Engineering
Hacking Gmail using Social Engineering
Zen map tool
Harvestor usage
Generating Word list for hacking
information gathering using dmitry tool
information gathering using netdiscover
information gathering using sparta
Password Attacking through Hydra
Password Attacking through Medusa
Password Attacking through John
Password Attacking through Crunch
Password Attacking through Cewl
Scanning Web Application and web sites using wpscan
Scanning Web Application and web sites using cmseek
Website Information Gathering
Scan Website Vulnerability
Nikto (Website Information Gathering Tool)
Understand Hashing Algorithm
Crack Hash Algorithms
WordPress Security Scanner
Finding emails for Hacking
Learn Wireshark Tool
Learn Tshark Network Monitoring Tool
 System Security using Kali Linux.
Encrypt File and Folder using Kali Linux.
Openssl tool for cryptography
gpg- encryption
Vim Editor Security.
Hide your Real IP from Hackers.
Security Audit using Lynis (Automated Security Testing)
rootkit Scanning
Antivirus installation and usage in Kali Linux.
Encrypting Encrypting ZIP file.
Hiding text inside Images
Cyber Forensic using Windows