Integrated Ethical Hacking

Ethical Hacking Tuition Center Jaipur

Satish Tiwary(Trainer)

Ethical Hacking and Cyber Security Complete Integrated Training Modules

Complete Training Duration up to 115 hrs

Training fees 1000 USD

Integrated Ethical Hacking Training

Lab Setup classes: 4hrs 20 USD

Installation and Configuration of Virtualization Technology

Windows Installation inside VirtualBox

Linux (Redhat) Installation inside VirtualBox

Kali Linux Installation

Different Type of Network settings

Remote Support Through Virtualization

Virtualization extensions

Windows Operating System: 6 hrs 80 USD

Basics of Windows

File and Folder Management in Windows

User Management in Windows

Disk Management

File and Folder Security

Disk Security

USB Security

Registry Editor

Group Policy Editor

Network Setup and Testing

Information gathering

Processor Hacking

Memory Management in Windows(virtual memory)

Malware Detection

System Performance

System Monitoring

Windows Password Hacking and Bypass

USB as RAM

Virtual hard Disk

Encrypting Virtual Hard Disk

CCNA Training Modules: 35 Hrs 150 USD

Introduction to computer Network

OSI Model Explanation and Understanding

TCP/IP Model and Internet

Introduction to Cisco Packet Tracer

Understand Network Topology

Understand wires and cables used in networking

Difference between Hubs- switches and Routers

IP Address brief

Types of Address

IPV4 addressing

binary conversion

Network Architecture

LAN MAN WAN SAN

understand DHCP server working

Understand DNS Server working

Understand FTP Server working

Understand SMTP and POP3 Server working

Understand NTP Server working

Understand HTTP and HTTPS Server working

Understand Syslog Server working

DHCP DNS FTP HTTP SMTP POP3 combined LAB

Router Components

Components of routers

RAM NVRAM and FLASH Memory

Introduction to cisco IOS

IOS Modes on Cisco Devices

User EXEC mode

Privileged EXEC mode

Configuration mode

Interface Configuration mode

• Line Configuration mode

• Router Configuration mode

Enable Passwords

Line Passwords and Configuration

assign an IP address to an interface:

Assign secondary ip address on an Interface

Managing Configuration Files

running-config

startup-config

view the contents of the running-config and startup-config files

delete the contents of the startup-config file:

change the host name of your router

assign a description to an interface for documentation purposes

create a banner message which users will see when logging into an IOS device

Need of routing

Routing Configuration

Routing very basic Lab

Static Routing Configuration

Default Routing Configuration

Static with Default Routing with configuration

Router Loopback Interfaces

Dynamic Routing

Difference between Static and Dynamic routing

RIP Routing Configuration

RIPv1 and RIPv2

EIGRP Configuration Lab

EIGRP configuration with same AS value

EIGRP Configuration with different AS Value

OSPF Configuration basic Lab

OSPF configuration with single AREA

OSPF Configuration with Multi Area or Multi Area OSPF Lab

Router as a DHCP server

Router as a DHCP Client

Router as a Multiple DHCP Server

Switch Basics

Assign IP Address on Switch

Gateway IP on Switch

VLAN creation and Deletion on SWITCH

VTP

Multi user Lab using SWITCH

Telnet Configuration on switch

SSH configuration on switch

SWITCH SECURITY

enable password on switch

enable secret on switch

service password-encryption

PPP

Password Authentication Protocol configuration

CHAP configuration

ACL Configuration Lab

NAT configuration Lab

Removing IP Address from router Interfaces

Remove wrong Routing Configuration From router

Router Configuration Backup and Restore using TFTP Server

Router Configuration Backup and Restore using FTP Server

Linux Essential (Red-hat Enterprise Linux) 15 Hrs 150 USD

Red Hat Enterprise Linux basics and it’s variants

Design Classroom Network Using Virtualization Technology For Lab Practice.

Virtual-box installation and configuration.

VirtualBox Network Adapter settings.

Vmware Installation and Configuration.

Vmware Network Adapter settings.

Linux Files and Folder.

Copying files and folders in Linux.

Moving and Renaming Files and Folders in Linux.

Determining File Content.

Creating Fake files with desired size.

Standard input/output to a file.

Searching files and Folders in Linux.

Vim editor

Nano Editor

Writing shell script in Linux.

samples of shell scripting with examples.

Scripting:for Loops

Scripting:if statements

Spell check with Aspell command line tool.

Permission Types in Linux.

Changing files and Folder Permissions.

Special Permissions for files and folders in Linux.

Changing User ownership and group ownership.

Symbolic and Numeric Method.

Soft Linking and hard Linking Files and Folders in Linux.

User and Group Management in Red Hat Enterprise Linux.

User management tools.

System users and groups.

Shell scripting for user management

shell scripting for user and group management

shell scripting for user and password management.

Different methods to Lock users in Linux.

Different Methods to Unlock Users in Linux.

Different methods to enable/Disable users in Linux.

Linux File System.

Partition creation and Deletion in Linux.

Linux File System Up-gradation and Degradation.

Swap Partition creation and Deletion.

Swap File Creation and Deletion.

Linux Server Configuration 14 hrs 100 USD

Xinetd Managed Services in Red Hat Enterprise Linux.

Telnet server

Secure Telnet server

Telnet Proxy

Proxychain For Telnet

Service and Application Access Controls in Linux.

Initialization Script Management.

Package Management in Linux using RPM and YUM.

Yum Local and Remote Server.

Network Configuration and Management in Linux.

Forward Lookups and Reverse Lookups

Exploring DNS with HOST.

Network File Service Configuration and Management.

NFS Server and NFS Clients and it’s utilities.

Samba service configuration and management.

TFTP Server Configuration

Uploading and Downloading Files through TFTP

File Transfer Protocol Configuration and Management.

Printer Configuration in Linux.

Apache Server configuration in Linux.

Apache Namespace configuration in Linux.

Virtual Hosting.

Proxy server Configuration for Your Web Server

Simple Mail Transfer Protocol Configuration and Management.

Squirrelmail and PHP.

Incoming sendmail configuration and outgoing sendmail configuration.

Postfix mail server configuration.

Dovecot configuration.

Web Based Mailing Service Live Project.

IMAP and POP3

OpenSSH Server configuration

scp:secure file transfer

Finger Server Configuration

Chat Server

Server Security 6 hrs 50 USD

SSH security

Telnet Security

IP Based Security

Network based Security

Time Based Security

Connection Based Security

Load Balancing

Apache Server Security

Checksum and verification

Clear Cache memory

md5sum and sha1sum

generate audit reports

Audit report about Linux Users

Report about Configuration changes

Report about logins

Report about account modifications

Successful Logins

Login summary Report

Records of bad Login attempts

FIREWALL and TCPWRAPPER Training 10hrs 100 USD

Basics of IPTABLES

Configuration file for IPTABLES

File settings for IPTABLES

Firewall services

Allow or Deny Incoming Request

Allow or Deny Outgoing Request

block or allow certain IP Address

block or allow certain network Address

Block all ICMP incoming traffic

Block or allow all FTP/HTTP incoming traffic

Create user defined chain

Delete user defined chain

Allow or Block particular PORT or service for particular IP Address or Network Address

Rename user defined chain

Log firewall rules

Backup or Restoring rules in iptables

MAC address level filtering

TCP/UDP Port Filtering

TCPWRAPPER BASICS

BLOCK/ALLOW IP ADDRESS or Network Address through TCPWRAPPER

Block or Allow Particular service

Block or alow Particular Service for particular IP or Network.

Ethical hacking with Kali Linux and Penetration Testing (25 hrs) 350 USD

Install Kali Linux Graphically.

Setup Kali Linux Network Lab with Virtualization Technique.

Install Windows and RedHat Enterprise Linux as Client Machine.

Create and Configure a Bridge and Internal Network between all OS.

Files and Folder Creation,Deletion and Renaming in Kali Linux.

Updating,Upgrading,Distro Understanding in kali Linux.

Kali Linux Administration.

Networking basics in Kali Linux.

Network Scanning in Kali Linux.

Network Monitoring in Kali Linux.

PostgreSQL Service

Metasploit configuration

Hack Telnet server using Metasploit

Hack SSH Server using Metasploit

HACK FTP Server using Metasploit

Hack HTTP/WEB Server using Metasploit

Metasploit and everything HTTP

Hacking With Kali Linux

Setup Client Machines and Targets for Hacking.

Hacking FTP using Hydra.

Hacking SSH using Hydra.

Hacking WEB Services using Hydra.

Database Hacking and Password Attacks using Kali Linux

Learn to Download and use Dictionary attack.

Port Scanning using Nmap

IP and Network Scanning

DNS Footprinting

DNS Enumeration

Hacking facebook using Social Engineering

Hacking Gmail using Social Engineering

zenmap tool

DNSenum

DNSdict

Harvestor usage

DNSrecon

Generating Word list for hacking

information gathering using dmitry tool

information gathering using netdiscover

information gathering using sparta

Password Attacking through Hydra

Password Attacking through Medusa

Password Attacking through John

Password Attacking through Crunch

Password Attacking through Cewl

Scanning Web Application and web sites using wpscan

Scanning Web Application and web sites using cmseek

Website Information Gathering

Scan Website Vulnerability

Nikto (Website Information Gathering Tool)

Understand Hashing Algorithm

Crack Hash Algorithms

WordPress Security Scanner

Finding emails for Hacking

Learn Wireshark Tool

Learn Tshark Network Monitoring Tool

System Security using Kali Linux.

Encrypt File and Folder using Kali Linux.

Openssl tool for cryptography

gpg- encryption

Vim Editor Security.

Hide your Real IP from Hackers.

Security Audit using Lynis(Automated Security Testing)

rootkit Scanning

Antivirus installation and usage in Kali Linux.

Encrypting Encrypting ZIP file.

Hiding text inside Images

Cyber Forensic using Windows