• Close
  • Batch Start Date
    March 26, 2023
  • Number of Students
    20 Seats
  • Learning format
    Experts
Why join this Programs?
Real World Business

Get insights on how ai is across companies like E-sewa ,Daraz, Khalti... more

Learn from Dursikshya Faculty

learn live from top Dursikshya faculty with online master classes

Dursikshya's Academic Eminence

Gain a certificate from Dursikshya online from Dursikshya

Immense Domain Exposure

learn how ai can be applied across business functions such as Network Administrator

Description
ETHICAL HACKING TRAINING COURSE

To become a Certified Ethical Hacker, the program is excellent for validating your knowledge of network security, session hijacking, cryptography, system penetration testing, creating firewalls, and more (CEH). The CEH v12 course from Dursikshya provides you a firm grasp of the security components and equips you to face any issues that may occur in the field of cyber security

Key Features
  • 90 hours of training with an instructor
  • Much practice with current features
  • Learn by doing and go through the entire development cycle
  • Advance from basic to intermediate Knowledge of Ethical Hacking Course
ETHICAL HACKING TRAINING COURSE Pathway

  • Information Security Overview
  • Threats and Approaches
  • Ideas In Hacking•
  • The Ideas Behind Ethical Hacking
  • Controls for information security and related ideas Testing for Penetration
  • Information Security Laws

  • Ideas about footprints
  • foot printing using search engines and websites
  • Email and Social Networking Site footprinting
  • Making a mark with social engineering
  • Getting Started with Website footprinting
  • What exactly is business intelligence?
  • DNS footprinting: What is it?
  • What exactly is a network footprint?
  • Tools for tracking footprints
  • How do countermeasures work?
  • Footprinting Pen Testing

  • Understanding Network Scanning
  • What do Scanner Tools do?
  • Methods for Scanning Networks
  • Beyond IDS and Firewall Scanning
  • Banner grabbing – what is it?
  • How Are Network Diagrams Drawn?
  • Pen-scanning Testing

  • Ideas Related to Enumeration
  • NetBIOS Enumeration: What is it?
  • Describe SNMP enumeration.
  • LDAP Enumeration: What Is It?
  • What are NFS Enumeration and NTP?
  • What exactly are DNS enumeration and SMTP?
  • Additional Counting Methods (IPsec, VoIP, RPC, Unix/Linux,
  • BGP enumeration, Telnet, FTP, TFTP, SMB, IPv6, 
  • Enumeration Countermeasures: What are they?

  • Vulnerability assessment concepts
  • Types of vulnerability classification and evaluation
  • Solutions and Tools for Vulnerability Assessment
  • Reports on Vulnerability Assessment

  • Hacking system concepts
  • How do I get in?
  • How Can Passwords Be Broken?
  • Vulnerability exploitation: What is it?
  • How Can Privileges Be Escalated?
  • Upkeep of Access
  • How Do Applications Get Run
  • What do Hidden Files do?
  • How are logs cleared?

  • Threat Concepts
  • Concepts APT
  • Trojan Ideas
  • Concepts of Viruses and Worm
  • Concepts for File-less Malware
  • Analysis of malware
  • Countermeasures for Malware
  • Malware-Detection Software

  • The idea of sniffing
  • How do MAC attacks work?
  • How do DHCP attacks work?
  • ARP Poisoning: What Is It?
  • How do spoofing attacks work?
  • How does DNS poisoning work?
  • What kinds of Sniffing Tools are there?
  • Sniffing countermeasures: what are they?
  • Techniques for Detecting Sniffing

  • Concepts of Social Engineering
  • Techniques for Social Engineering
  • Internal Threats
  • False reporting on Social
  • Networking Web Pages
  • theft of identity
  • Social Engineering Prevention Techniques