Asian Academy of Ethical Hacking
It's Time To Move Over IT Security
AAEH Cyber Security Provides Ethical Hacking & Cyber Forensics Training
Best Institute of Ethical Hacking in Mohali Chandigarh
Asian Academy of Ethical Hacking is a place where you can
learn IT Security Training & Penetration Testing
previous arrow
next arrow
Slider

Certified Ethical Hacking Training

Why AAEH?

AAEH is an emerging Information Security Company providing Information Security Solutions to clients. Key factors which play role that why AAEH is best for Ethical Hacking training are:  Quality, affordability, regular exams, professional environment, guidance by experts, worth time utilization.

This ethical hacking course is designed keeping in mind hacker’s enthusiasm and hacking spirit. At the end of 3 months course, candidate will be provided with complete career assistance after clearing the final exam being conducted.

Course Detail: Overview of Topics

Part 1: Introduction

  • Introduction to Hacking
  • All about Cyber World
  • Introduction to Cyber Laws
  • Study of various IT acts
  • Hackers Psychology
  • Learning Linux from hacking point of view

Part 2: Network Security

  • Introduction to Networking
  • Wi-Fi Hacking
  • Intercepting packets: Man in the Middle attack
  • DoS and DDoS attacks
  • Vulnerability Assessment by mastering nmap
  • Nessus vulnerabilities scanning
  • Hacking with metasploit
  • Hacking Networks by evading firewalls
  • Packet crafting with hping3 and scapy
  • Taking down Networks
  • Study of popular vulnerabilities  and their exploitation
  • Countermeasures

Part 3: Playing with Passwords

  • Windows Password cracking
  • Various techniques of password cracking
  • Encrypted documents password cracking
  • Hacking psychology of users
  • Various password storing techniques

Part 4: Windows hacking and Security

  • Windows hacking by changing
  • Cracking passwords
  • Playing with User accounts
  • Remote hijacking with RATs
  • Getting into system by escalating privileges
  • Encrypting File System
  • Windows Firewall with Advanced Security
  • At last staying safe: Setting up a secure system

Part 5: Web Application Hacking

  • Introduction to web technologies
  • Information Gathering techniques
  • Intercepting requests, responses and playing with them
  • Hacking live Website
  • Mastering Web attacks
  • Database dump with SQL Injection
  • Exploiting users with Cross-Site Scripting(XSS)
  • Session Hijacking
  • Shell Upload, take everything down
  • User accounts hacking
  • Clickjacking  Attack
  • Security Misconfiguration
  • Remote Code execution vulnerability
  • File Inclusion Vulnerability
  • Hands-on Live Website
  • Securing own Website

Part 6: Abstract

  • Email Hacking
  • Email Spoofing
  • Hacking by Phishing
  • Rootkits
  • Spywares
  • Keyloggers
  • Webcam hacking
  • Social Engineering Techniques
  • Steganography: Hiding and Detection
  • Ciphers and Cryptography
  • Hacking by Scripting
  • Playing with malwares
  • Deleted data recovery
  • Working on Digital Forensics
  • Image Forensics
  • Case investigation
  • Evidence recovery
  • Securing Windows
  • Server Hardening
Close Menu