ethicalbasic

Course Features

Skill level:

Intermediate

Duration:

 3 Months

Projects:

 Yes

Practical Ratio:

 30 : 70

Assessments:

 Yes

Quizzes:

 Yes

Course Details

If the idea of hacking as a career excites you, this ethical hacking course will benefit you greatly. In this course, you will start by learning the basics of Computer Systems, DOS Commands, & Computer Hardware. You will further learn about Computer Networking & HTML & further dive into Cyber Security & Ethical Hacking Techniques. This course provides complete ethical hacking tools & techniques used by hackers & information security professionals.

Prerequisite

There are no prerequisites for this course.

Course Outcome

At the end of the course, you should be able to :

  • Gain a deep insight about how computers system work
  • Address emerging areas of IoT, cloud & mobile hacking
  • Combat Trojans, malware, backdoors & more
  • Hack using Mobile

Curriculum

  • Definition of Computers
  • Characteristics & Components of Computers
  • Hardware v/s Software
  • Input & Output Devices, Storage Devices
  • Types of Printers & Computers
  • Units of Memory, File Extensions
  • Setting Up a Computer
  • Cloud Computing
  • Operating System & its Types
  • Definition of DOS
  • DOS Commands
  • BIOS & Motherboards
  • Hardware Components & RAM
  • Storage Devices
  • Assembling Computer System
  • Installing & upgrading OS
  • Maintaining & Troubleshooting
  • Power Supplies
  • Overview of Pc Expansion Cards
  • Inside PC
  • BIOS & Motherboards
  • Hardware Components & RAM
  • Storage Devices
  • Assembling Computer System
  • Installing & upgrading OS
  • Maintaining & Troubleshooting
  • Power Supplies
  • Overview of Pc Expansion Cards
  • Inside PC
  • About HTML & DHTML
  • Brief about Tags
  • Student Introduction
  • Introduction to Ethical Hacking
  • Hacking Laws, Types of Hackers & Hacking
  • Cyber Crime & its Types
  • Famous Hackers
  • Tips for taking the CEH Responsibilities of Ethical Hacker
  • Footprinting
  • Finding IP Address of a Website & Hosting Company
  • IP Address Ranges
  • History of Websites
  • Web Updates Monitoring Sites
  • Google Advance Search Options
  • Google Hacking
  • IDN Homograph Attack
  • Changing MAC Address on Windows, Linux & Mac
  • Anonymizers
  • How Hackers Add VBS Payloads to Startup
  • Proxy- Practical & Chaining Tools
  • Steganography
  • How to Crack Windows Password
  • Download a Complete Website to access loopholes
  • Shodan Search Engine
  • View Saved Password in Computer
  • USB Rubber Ducky Device
  • Cyber Attack
  • Top 10+ Anonymous Search Engines that won’t Track your Search History
  • Regularization
  • Password Cracking
  • Monitor Website Traffic of Target Company
  • Types of Password Attacks
  • Google Location, Google My Activity
  • Windows Hacking
  • Registry Editor
  • How to Use Pen Drive/USB as RAM
  • Turn android Device into Hacking Device
  • Gradient Descent
  • Secrets Behind 127.0.0.1
  • Reverse IP Engineering & its Practical
  • Scanning
  • Types of Computer Worms
  • Malware, Worm, Types of Computer Worms
  • VB Scripting
  • Find Health of Your Hard Disk
  • 12 Best Unbeatable Notepad Tricks (Codes & Hacks)
  • Top 10 Wi-Fi Hacking Tools
  • Hack android Pattern Lock
  • How to Block a Particular Website through Windows