Integrated Ethical Hacking


Ethical Hacking Tuition Center Jaipur

 Satish Tiwary(Trainer)


 Ethical Hacking and Cyber Security Complete Integrated Training Modules
Complete Training Duration up to 115 hrs

Training fees 1000 USD

Ethical Hacking Tuition Center Jaipur

Integrated Ethical Hacking Training


Lab Setup classes: 4hrs   20 USD


Installation and Configuration of Virtualization Technology

Windows Installation inside VirtualBox
Linux (Redhat) Installation inside VirtualBox
Kali Linux Installation
Different Type of Network settings
Remote Support Through Virtualization
Virtualization extensions

Windows Operating System: 6 hrs    80 USD


Basics of Windows
File and Folder Management in Windows
User Management in Windows
Disk Management
File and Folder Security
Disk Security
USB Security
Registry Editor
Group Policy Editor
Network Setup and Testing
Information gathering
Processor Hacking
Memory Management in Windows(virtual memory)
Malware Detection
System Performance
System Monitoring
Windows Password Hacking and Bypass
USB as RAM
Virtual hard Disk
Encrypting Virtual Hard Disk

CCNA Training Modules: 35 Hrs   150 USD


Introduction to computer Network

OSI Model Explanation and Understanding
TCP/IP Model and Internet
Introduction to Cisco Packet Tracer
Understand Network Topology
Understand wires and cables used in networking
Difference between Hubs- switches and Routers
IP Address brief
Types of Address
IPV4 addressing
binary conversion
Network Architecture
LAN MAN WAN SAN
understand DHCP server working
Understand DNS Server working
Understand FTP Server working
Understand SMTP and POP3 Server working
Understand NTP Server working
Understand HTTP and HTTPS Server working
Understand Syslog Server working
DHCP DNS FTP HTTP SMTP POP3 combined LAB
 Router Components
Components of routers
RAM NVRAM and FLASH Memory
Introduction to cisco IOS
IOS Modes on Cisco Devices
User EXEC mode
Privileged EXEC mode
Configuration mode
Interface Configuration mode
• Line Configuration mode
• Router Configuration mode
Enable Passwords
Line Passwords and Configuration
assign an IP address to an interface:
Assign secondary ip address on an Interface
Managing Configuration Files
running-config
startup-config
view the contents of the running-config and startup-config files
delete the contents of the startup-config file:
change the host name of your router
assign a description to an interface for documentation purposes
create a banner message which users will see when logging into an IOS device
Need of routing
Routing Configuration
Routing very basic Lab
Static Routing Configuration
Default Routing Configuration
Static with Default Routing with configuration
Router Loopback Interfaces
Dynamic Routing
Difference between Static and Dynamic routing
RIP Routing Configuration
RIPv1 and RIPv2
EIGRP Configuration Lab
EIGRP configuration with same AS value
EIGRP Configuration with different AS Value
OSPF Configuration basic Lab
OSPF configuration with single AREA
OSPF Configuration with Multi Area or Multi Area OSPF Lab
Router as a DHCP server
Router as a DHCP Client
Router as a Multiple DHCP Server
Switch Basics
Assign IP Address on Switch
Gateway IP on Switch
VLAN creation and Deletion on SWITCH
VTP
Multi user Lab using SWITCH
Telnet Configuration on switch
SSH configuration on switch
SWITCH SECURITY
enable password on switch
enable secret on switch
service password-encryption
PPP
Password Authentication Protocol configuration
CHAP configuration
ACL Configuration Lab
NAT configuration Lab
Removing IP Address from router Interfaces
Remove wrong Routing Configuration From router
Router Configuration Backup  and Restore using TFTP Server
Router Configuration Backup  and Restore using FTP Server

Linux Essential (Red-hat Enterprise Linux)  15 Hrs         150 USD


Red Hat Enterprise Linux basics and it’s variants
Design Classroom Network Using Virtualization Technology For Lab Practice.
Virtual-box installation and configuration.
VirtualBox Network Adapter settings.
Vmware Installation and Configuration.
Vmware Network Adapter settings.
Linux Files and Folder.
Copying files and folders in Linux.
Moving and Renaming Files and Folders in Linux.
Determining File Content.
Creating Fake files with desired size.
Standard input/output to a file.
Searching files and Folders in Linux.
Vim editor
Nano Editor
Writing shell script in Linux.
samples of shell scripting with examples.
Scripting:for Loops
Scripting:if statements
Spell check with Aspell command line tool.
Permission Types in Linux.
Changing files and Folder Permissions.
Special Permissions for files and folders in Linux.
Changing  User ownership and group ownership.
Symbolic and Numeric Method.
Soft Linking and hard Linking Files and Folders in Linux.
User and Group Management in Red Hat Enterprise Linux.
User management tools.
System users and groups.
Shell scripting for user management
shell scripting for user and group management
shell scripting for user and password management.
Different methods to Lock users in Linux.
Different Methods to Unlock Users in Linux.
Different methods to enable/Disable users in Linux.
Linux File System.
Partition creation and Deletion in Linux.
Linux File System Up-gradation and Degradation.
Swap Partition creation and Deletion.
Swap File Creation and Deletion.

Linux Server Configuration   14 hrs     100 USD


Xinetd Managed Services in Red Hat Enterprise Linux.
Telnet server
Secure Telnet server
Telnet Proxy
Proxychain For Telnet
Service and Application Access Controls in Linux.
Initialization Script Management.
Package Management in Linux using RPM and YUM.
Yum Local and Remote Server.
Network Configuration and Management in Linux.
Forward Lookups and Reverse Lookups
Exploring DNS with HOST.
Network File Service Configuration and Management.
NFS Server and NFS Clients and it’s utilities.
Samba service configuration and management.
File Transfer Protocol Configuration and Management.
Printer Configuration in Linux.
Apache Server configuration in Linux.
Apache Namespace configuration in Linux.
Virtual Hosting.
Proxy server Configuration for Your Web Server
Simple Mail Transfer Protocol Configuration and Management.
Squirrelmail and PHP.
Incoming sendmail configuration and outgoing sendmail configuration.
Postfix mail server configuration.
Dovecot configuration.
Web Based Mailing Service Live Project.
IMAP and POP3
OpenSSH Server configuration
scp:secure file transfer
Finger Server Configuration
Chat Server

Server Security 6 hrs         50 USD


SSH security
Telnet Security
IP Based Security
Network based Security
Time Based Security
Connection Based Security
Load Balancing
Apache Server Security

FIREWALL and TCPWRAPPER Training 10hrs        100 USD


Basics of IPTABLES
Configuration file for IPTABLES
File settings for IPTABLES
Firewall services
Allow or Deny Incoming Request
Allow or Deny Outgoing Request
block or allow certain IP Address
block or allow certain network Address
Block all ICMP incoming traffic
Block or allow all FTP/HTTP incoming traffic
Create user defined chain
Delete user defined chain
Allow or Block  particular PORT or service for particular IP Address or Network Address
Rename user defined chain
Log firewall rules
Backup or Restoring rules in iptables
MAC address level filtering
TCP/UDP Port Filtering
TCPWRAPPER BASICS
BLOCK/ALLOW IP ADDRESS or Network Address through TCPWRAPPER
Block or Allow Particular service
Block or alow Particular Service for particular IP or Network.

Ethical hacking with Kali Linux and Penetration Testing (25 hrs)   350 USD


Install Kali Linux Graphically.
Setup Kali Linux Network Lab with Virtualization Technique.
Install Windows and RedHat Enterprise Linux as Client Machine.
Create and Configure a Bridge and Internal Network between all OS.
Files and Folder Creation,Deletion and Renaming in Kali Linux.
Updating,Upgrading,Distro Understanding in kali Linux.
Kali Linux Administration.
Networking basics in Kali Linux.
Network Scanning in Kali Linux.
Network Monitoring in Kali Linux.
PostgreSQL Service
Metasploit configuration
Hack Telnet server using Metasploit
Hack SSH Server using Metasploit
HACK FTP Server using Metasploit
Hack HTTP/WEB Server using Metasploit
Metasploit and everything HTTP
Hacking With Kali Linux
Setup Client Machines and Targets for Hacking.
Hacking FTP using Hydra.
Hacking SSH using Hydra.
Hacking WEB Services using Hydra.
Database Hacking and Password Attacks using Kali Linux
Learn to Download and use Dictionary attack.
Port Scanning using Nmap
IP and Network Scanning
DNS Footprinting
DNS Enumeration
Hacking facebook using Social Engineering
Hacking Gmail using Social Engineering
zenmap tool
DNSenum
DNSdict
Harvestor usage
DNSrecon
Generating Word list for hacking
information gathering using dmitry tool
information gathering using netdiscover
information gathering using sparta
Password Attacking through Hydra
Password Attacking through Medusa
Password Attacking through John
Password Attacking through Crunch
Password Attacking through Cewl
Scanning Web Application and web sites using wpscan
Scanning Web Application and web sites using cmseek
Website Information Gathering
Scan Website Vulnerability
Nikto (Website Information Gathering Tool)
Understand Hashing Algorithm
Crack Hash Algorithms
WordPress Security Scanner
Finding emails for Hacking
Learn Wireshark Tool
Learn Tshark Network Monitoring Tool
 System Security using Kali Linux.
Encrypt File and Folder using Kali Linux.
Openssl tool for cryptography
gpg- encryption
Vim Editor Security.
Hide your Real IP from Hackers.
Security Audit using Lynis(Automated Security Testing)
rootkit Scanning
Antivirus installation and usage in Kali Linux.
Encrypting Encrypting ZIP file.
Hiding text inside Images
Cyber Forensic using Windows








Advertisements