Ethical Hacking Course
- Offered byInternshala
Ethical Hacking Course at Internshala Overview
Duration | 8 weeks |
Total fee | ₹1,349 |
Mode of learning | Online |
Difficulty level | Beginner |
Credential | Certificate |
Ethical Hacking Course at Internshala Highlights
- Earn a certificate of completion from Internshala
- Placement assistance to build your career
- 72 hacking challenges & 1 project to help you practice hacking
- Downloadable content with lifetime access
Ethical Hacking Course at Internshala Course details
- Searching for vulnerabilities, detecting them, and suggesting fixes
- Students get to be the modern day Sherlock Holmes
- With the entire world and its data coming online, the demand for cybersecurity experts is skyrocketing
- The average salary of a Cybersecurity Analyst is 6.8 LPA+ according to Indeed
Ethical Hacking Course at Internshala Curriculum
Basics of Information Security and Computer Networking
Introduction to Information Security
Hacking Methodologies and Security Auditing
Computer Networking
IP addressing and NAT
The Google Maps of the Internet
Ports and Services
Protocols, TCP/IP and OSI Model
Proxy and VPN
Information Gathering and Basics of Web Development
Digital Footprints and Information Gathering
Advanced Information Gathering about People and Websites
Google Dorking- Hacking using Google
Introduction to Web Architecture and Understanding Common Security Misconceptions
HTML Basics
HTML and Introduction to Javascript
Introduction to PHP and Setting up XAMPP
Putting Brains into Beauty- Working with PHP
Handling User Input and Building Basic Applications using PHP
Introduction to Web VAPT, OWASP and SQL Injections
Introduction to VAPT and OWASP
Basics of Databases and SQL
Authentication Bypass using SQL Injection
GET based SQL Injection- Part 1
GET based SQL Injection- Part 2
POST based SQL Injection- Part 1
POST based SQL Injection- Part 2
Advanced SQL Injections
Automating SQL Injections- SQL Map
Advanced Web Application Attacks
Bypassing Client Side Filters using Burp Suite
IDOR and Rate-limiting issues
Arbitrary File Upload Vulnerabilities
Client Side Attacks
Understanding Important Response Headers, DOM, and Event Listeners
Fundamentals of Cross Site Scripting (XSS)
Understanding Forced Browsing and Session-Cookie Flaws
Cross Site Request Forgery (CSRF) and Open Redirections
Dictionary Based Brute Force Attacks
Logical Brute Force Attacks
Personally Identifiable Information (PII) Leakage and Sensitive Information Disclosure
Identifying Security Misconfigurations and Exploiting Outdated Web Applications
Common Security Misconfigurations
Default/Weak Password Vulnerabilities
Fingerprinting Components with Known Vulnerabilities
Scanning for Bugs in WordPress and Drupal
Using Public Exploits
Automating VAPT and Secure Code Development
Information Gathering for Endpoints
Application Assessment using Nmap
Automating VAPT with Nikto and Burp Suite Pro
Documenting and Reporting Vulnerabilities
Documenting Stages of Vulnerabilities Using Tools
VAPT Reports: Developer Report v/s Higher Management Report
Concepts of Code Security and Patching
Parts of a VAPT Report
Common Good Practices and Bad Practices
The Final Project
Final Project