0% found this document useful (0 votes)
64 views15 pages

Ethical Hacking Online Course Brochure

Uploaded by

januoh09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views15 pages

Ethical Hacking Online Course Brochure

Uploaded by

januoh09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Become an

ETHICAL

HACKER
Duration: 2 Months

Level up your skills with

Ethical Hacking Mentorship Program


Curious??

We know, what’s on your MIND!

3
Why
2 sho
uld

1 al I ch
ing a oos
t is Ethic y is E th ical Hack WsC e

Wha Wh path? ube 4


ing? g career Tec
Hack promisin h?
Ho
w
pr do
og es
ra th
m
wo is

rk
?

6 7
Who are my
ly

5 act
x mentors? Am
at e ge Ig
Wh n? tc
l l I lear ar oi
ng
wi ee
rs to
up

po
r t?

9
Are there any
10
success stories
8 ate from the past?
c er tific
a
I get my
Ho
Will ance in
w
to
n h
to e thi en
me? sp rol
resu rog l

ram
?
1
What is
Is your Digital Identity
Ethical Hacking?
safe and secure?

In today's tech-savvy world, where we


rely heavily on the internet for
everything from online shopping to
online banking, protecting our
information is a major challenge.
RH Bank

Whenever we do something online,


we leave behind our digital footprints.
Once we post or share something
online, it can stay there forever.

Just because we don’t see it, does not


mean it doesn’t exist!

Have you heard of the devastating


ransomware attack in

May 2017 that started in Asia and


quickly spread worldwide?

Within just one day, over 23,000 WannaCry


computers in 150 countries
Ransomware Attack
were infected.

This attack caused chaos across various sectors, affecting big-


name companies like Hitachi, Nissan, and FedEx, demanding
ransom payments in the Bitcoin cryptocurrency.

Even now, ongoing cyber attacks are happening worldwide every day.

Ethical hackers being the


superhero, prevent our data
from being stolen and misused
by malicious attackers.

They discover vulnerabilities in weak


systems and implement a secure network
that prevents security breaches.

If this excites you, you are at


the right place.

Become the unsung hero & ensure the security of every

Click, Share, And Transaction..


2
Why is Ethical Hacking a
promising career path?

We’ve fetched some data for you!

says that cybersecurity is The job market for ethical hackers,


a highly in-demand job right now, is predicted to increase by 32%
with around 157,000 job openings from 2022 to 2032. This growth is
worldwide. much faster than most other jobs.

We Hiring
ar
Hiri e

ng Penetration
Tester Career
Hiring
Hiring
Inform
ity
Secur r
ee
Prospects for
ation Engin
Ethical Hackers
Secur
ity An
alyst

Hiring Hiring
Security Netw
ork S Hiring
e
Consultant Engin curity
eer Chief Information
Security Officer (CISO)
Hiring
Application

Security Engineer

Grab this opportunity before you miss the wave


of endless possibilities!
3
Why should I choose

WsCube Tech?

Your Success is

Our Mission

WsCube Tech’s Upskilling Pedagogy Program

Curriculum

Project-Based Learning
Engage in real-word projects, especially designed to
enhance your critical thinking, collaboration, and
problem-solving skills.

Secure Windows, Linux, and Create undetectable Android


Server Environments by payloads within innocent-looking
configuring and optimizing apps using AhMyth binding.

firewalls.

Doubt Resolutions Deep Dive with

You can ask all your questions and doubts to the


Case Studies
mentor during the Live classes. All your doubts
We offer insights into real-life
will be resolved efficiently to ensure quality learning. problems, and solutions to help you
understand complex concepts, and
real-world scenarios.

Our learners are working with leading brands.

Program Ratings

4.9
(8732 Reviews)
Glimpse of Ethical Hacking Journey

Come and explore the exciting

digital world with us,

where everyone is welcome!

Your class would look like this

Who can apply for the course?

Students Entrepreneurs Penetration


Security

Testers Analysts

Security Ethical
Software
Network

Engineers Hackers Engineers Administrators

Let's embark on this Ethical Hacking journey together.


4
How does this

program work?

Learn

Upskill yourself with leading

professionals to gain insights from their


vast experience.

Practice

Sharpen your skills by learning through


course assignments, live projects, and
regular assessments and quizzes.

Ask

Resolve your queries with industry


experts with our dedicated doubt-
clearing sessions.

Build

Craft a diverse portfolio and resume with


LinkedIn optimization showcasing your
Ethical Hacking expertise.

Crack

Seize your ideal job and make an


impact in your career.

Resume Building LinkedIn Profile


Mock
Placement

Optimization Interviews Assistance
5
What exactly

will I learn?

Course Curriculum

20 44 19
Tests
Modules Live Classes

1 3 12
Case Study Projects Assignments

5 Live Classes 1 Test


Notes 1 Assignment

Module 1
Networking
Role of networking ports
Introduction to networking

Networking protocols
Networking concepts

Types of Networking
What is TCP and how does it work?

What is ISP? Network Protocols

What is IP address? How does internet work?

Versions and types of IP adress OSI vs TCP/IP model

What is MAC address? Domain name and DNS records

Request & Responses

Assignment

Apply your knowledge to answer the

questions related to networking


components.

4Lv i e Classes 1 Test


Notes 1 Assignment

Module 2
Linux
What is Linux? Basic Linux commands (Practical)
Cool Features of Linux Advance Linux commands (Practical)
Basic File System of Linux Getting Familiar with Linux OS

Assignment

Identify and resolve errors in the

given sources.list file

2 Live Classes 1 Test


Notes 1 Assignment

Module 3
Setting Up Ethical Hacking Lab
Kali or Parrot OS in VMware or
Installing
Setting Up Lab VirtualBox
Install VMware or Virtual Box Downloading a good wordlist for Kali Linux

Assignment

Change default port in Apache2 to

ensure your server runs on non -


standard por t


4Lv i e Classes 1 Test


Notes 1 Assignment

Module 4
Footprinting And Reconnaissance

Introduction to Footprinting & Website footprinting using Netcraft,


Reconnaissance Wappalyzer, 3rd party sources
Types of Footprinting Email footprinting using Email Tracker Pro

DNS footprinting using DNSenum, DNS


Entities of information gathering
lookup, M X lookup, NS lookup
Source of information gathering
WHOIS footprinting
Performing information gatering using

search engines Footprinting through OSINT framework

Information gathering using

Google Dorking and ASO Footprinting using Kali Linux


DNSenum, DNS Recon, Sublister tools for
footprinting

Assignment
Domain Name

Use information gathering techni ques


to find domains & subdomains related https://www.wscubetech.com
to WsCube Tech

Protocol -
Sub Domain Top - Level Domain

3 Live Classes 1 Test


Notes

Module 5
Network Scanning

What is network scanning? Checking for software with versions

Network scanning methodology OS fingerprinting and banner grabbing


countermeasures
Types of network scans
Saving XML report for Metasploit &
Checking for live systems and Buffer si e z Conversion

Checking for open ports

Checking for services on ports

1 Live Class 1 Test


Notes 1 Assignment

Module 6

Enumeration

Introduction to enumeration DNS enumeration

Types of enumeration How to enumerate all services?

Default ports
Enumeration countermeasures

NetBIOS enumeration

SNMP & SMTP enumeration

NFS enumeration

Project Outcome

Compromise at least 5 ports on a

Network Scanning with Nmap


system using Nmap, msf, Armitage,

and Netcat.
Perform Enumeration Using

Nmap Scripts

Search for Best E ploits x

Using MSF

Test and Analy e All z

Selected E ploits x

Assignment

Perform network scanning on

Metasploitable2 for vulnerability

assessment and network security

2 Live Classes 1 Test


Notes 1 Assignment

Module 7
Vulnerability Assessment

Introduction to vulnerability assessment Installing Acuneti x Pro


Classi fication of vulnerability Vulnerability scoring systems
Scanning for vulnerabilities in Nmap scan report Vulnerability assessment lifecycle
Vulnerability assessment using ZAP Vulnerability assessment solutions
Scanning for vulnerability in Nmap scans

result (MSF, Exploit DB, Armitage)

Assignment

Use Z AP to scan a target website,

identify security fl aws, and submit

Z x
AP pro y report

3 Live Classes 1 Test


Notes

Module 8
How to Be An Anonymous Hacker?

Understanding layers of Internet (Deep, Anonymous Con figuration in Linux
Dark, Surface & Hidden Web)
Changing User Agent (Random User Accessing Dark Web (Tor Browser)
Agent Switcher )
Creating Dark Web Website (Tor Server)
Changing MAC Address (macchanger)

Auto Run Shell Script (macchanger)

VPN & Proxy

10 Live Classes 1 Test


Notes 2 Assignments

Module 9
System Hacking
Introduction to System Hacking System Hacking using U RL

Cracking Windows Passwords System hacking using open ports

Creating Good Password Lists using Google U RL Masking


Dork and Crunch

System Hacking using NetCat


Windows & Linux privilege escalation
Cracking Windows Password (Pwdump,
ophcrack, lophcrack )

Assignment

Identify open ports in

Metas ploitable2 and analyze at


x
least two e ploits for each port.

Use ms f to hack a system


(identify, exploit, and analyze
vulnerabilities )

2 Live Classes 1 Test


Notes 1 Assignment

Module 10
Mal ware Threats
Introduction to Malware Static Malware Analysis

All About Malware Analysis Dynamic Malware Analysis

x
E ample of Malware Malware Analysis Tools Practical

What is Trojan? Creating Payloads (MSF)

What are Viruses and Worms?


Types of Malware Analysis

Project Outcome

Create undetectable Android payloads

-
within innocent looking apps using
AhMyth Installation and Setup

AhMyth binding. Download a Small Si ed - z

Original AP K
Bind the AP K with Payload
Share the AP K to Android Device

Assignment

Use A hMyth to create Android


payload and hack mobile device .


2 Live Classes 1 Test


Notes

Module 11
Sniffing
What is Sniffing? MAC Spoo fing & Flooding
Active Scanning Techni ques DHCP Flooding

Types of Sni ffing Setup DHCP Rouge (MITM Attack) Using


Ethercap

Protocols Vulnerable to Sniffing


Sni ffing with Wireshark

1 Live Class 1 Test


Notes 1 Case Study

Module 12
Social Engineering
Introduction to Social Engineering -
Computer based Social Engineering

Types of Social Engineering -


Mobile based Social Engineering

-
Human based Social Engineering Social Engineering Tools

Case Study
Microso t f 365 phishing scam steals
user credentials.

3 Live Classes 1 Test


Notes

Module 13
DoS and DDoS Attacks

What is DoS Attack? Installing Burp Suite Pro

What is DDoS Attack? DoS attack on websites

What is DRDoS Attack? DoS attack using programs and commands

(CPU and Memory Utilisations)


DoS in Networking (hping3, MSF )

2 Live Classes 1 Test


Notes

Module 14
Session Hijacking
Introduction to Session Hi iacking j j
Hi ack session using Burp Suite

Professional, Ettercap
How to Perform Session Hi acking? j
Types of Session Hi acking j

3 Live Classes 1 Test


Notes

Module 15
Hacking Web Servers & Web Apps
Introduction to web servers and web apps
Web Application Concepts
Vulnerability Scanning using Acunetix
Web application hacking methodology Pro, Burp Suite

Assignment

Uncover and report the

vulnerabilities in a target website

using Acuneti x.

3 Live Classes 1 Test


Notes

Module 16
Hacking Wireless Networks

Introduction to wireless networks Hacking wireless networks

Types of wireless encryption Hacking WEP (Wi-Fi)

5 Live Classes 1 Test


Notes 1 Assignment

Module 17
Hacking Mobile Platform
Mobile Platform Attack Vectors Using Keylogger App
Android & IOS Security Scan (MVT,
O WASP Top-10 Mobile Risks- 2016
iMa ing z )
Mobile Platform Vulnerability and Risks Installing Termu x on Android
Calls, SMS, Email Bombing on Android Installing Net Hunter Kali on Android

Assignment

InstallKali NetHunter on Android to


turn your smartphone into a hacker’s

device

3 Live Classes 1 Test


Notes

Module 18
Cryptography
What is Cryptography? Types of Cryptography

Difference Between Encoding, Hashing & Cryptography tools

Cryptography

1 Live Class 1 Test


Notes 1 Assignment

Module 19
System Security Using Firewall, WAF, and Antivirus


Introduction to firewalls GUI Linux firewall configuration


GUI Windows firewall configuration

Project Outcome

Secure Windows, Linux, and Server


Securing Windows with Firewall
Environments by configuring and
Defender
optimizing firewalls. 


Using UF W to Secure Linux


Securing an Apache2 Server

with ModSecurity

Assignment

Con figure firewalls on Windows and


Linux systems to prevent against
cyber threats.

1 Live Class Final Test


Notes

Module 20
Job Assistance and Career Counselling
How to optimi e your z LinkedIn profile? How to select a domain in Cyber Security?

j
Preparing for ob interviews Useful resources to keep upskilling
40+ Ethical Hacking Tools

Useragent switcher

and manager

Armitage

DNS Lookup NS Lookup MX Lookup

Windows Firewall WAF mod sec

Airemon-ng Airodump-ng airplay-ng

Macoff Camphish macchanger Tor


6
Who are my mentors?

Well, hold onto your seats

because we're about to introduce you to the


Rockstars behind the scenes.

That's us!
That's us!

Upskilling Bharat with Trust and Excellence!

24580+ 425+ 7+
Learners
Masterclasses
Year of

Trained Delivered Experience

45650+ 28+
Hours of Live
Domain

Mentorship Expertise
7
Am I going to

get career support?


We have got you covered!
Building a career you love,

one step at a time.

Mock interviews
Boost your interview skills and
confidence with our expert guidance,
ensuring you shine in every opportunity.

Aditi Singh

Resume Building
We assist in creating resumes tailored to
meet the demands of the Flutter App
Development industry.

Placement Assistance
Practice your interviewing skills with
mock interviews and receive placement
assistance to help jump-start your career.

LinkedIn Profile Optimization

Maximize your impact in the professional


world through strategic LinkedIn profile
optimization by WsCube Tech. Aditi Singh
Ethical Hacker

Portfolio Building
Receive assistance in creating a
remarkable portfolio that effectively
showcases your skills.
8
Will I get a certificate to
enhance my resume?

Grab the spotlight by


getting certified!

Upon finishing our Ethical Hacking mentorship program,

you'll earn a certificate of completion.


9
Are there any success
stories from the past?

Discover the hype


by yourself!

Sneak Peek from our Learners

CLICK CLICK CLICK

Parth Parikh Sahil Sain Deepak


(Student) (Student) (Student)

Trusted by Thousands

Google Review
Rated 4.7 (853 Reviews)
WsCube Tech offers

Tech-Integrated Hybrid
Upskilling Experience

Level up your Ethical Hacking Skills


with our Online and Offline presence.

Offline/Online Classes

Join our doubt-solving sessions, where


our mentors get your queries resolved!

Doubt-clearing sessions

Our expert-led workshops bring knowledge


to life with practical experiences.

Exclusive
Exclusive Masterclasses/Workshops
Masterclasses/ Workshops

We aim to encourage collaboration and

offer an engaging learning environment.

Community Learning/Group Discussions


10
How to enroll in

this program?

You are one step away from


your dream career!

CLICK
Enroll Now

Still unsure?

Call Now to Book 2-Days of

Demo Classes

+91-85610-89567

For any other details, feel


free to reach out.

We are here to help!

@wscubetech www.wscubetech.com /wscubetechindia

You might also like