Professional Documents
Culture Documents
Certified
oogleEthical Hacking
Certified
Course Course
Digit l Marketing
EC-Council
BeBea aGoogle
Googl Certified Digital Ethical
Certified Marketer
Mar eterHacker
Modules,
odules, Details & Fees
Total Modules- 24 ((highest
25 ighest in Industry)
Duration- 2-Months
3 onths
Full Course Fees- 12,500.00
0 0 (Pay in two Installments -6500*2)
Visit
Important Terminology
Ethical Hacking vs. Hacking
Effects of Hacking on Business
Why Ethical Hacking Is Necessary
Skills of an Ethical Hacker
What Is Penetration Testing?
What is Network?
Various types of network topologies
Dissimilar type of Network Devices
Protocols & Port numbers
IP Addressing and its classes
VPN Network, DHCP Server
DNS Server, OSI Model
Server Configuration
Importance of Virtualization
Features and Terminologies
Create & Run Your First Virtual Machine OS
Connect USB to Virtual Machine
Network Adapter and More Settings
Create Network in VMs
Share Data in Network
Special Features of Virtualization
Problem Handling
Various types of Virtualization Programs
Chapter 5: Scanning
OS Authentication Architecture
OS Hash BruteForcing
OS Password Cracking
Windows Login Bypass
OSX Login Bypass
Data Stealing Techniques
Social Engineering
Fake Emails
Identify Fake Emails
KeyLoggers
Email Encryption
Counter Measures
Phishing Attacks
Desktop Phishing
Spear Phishing
Types of Steganography
Techniques of Steganography
How Steganography Works
Image Steganography
Working with Tools
Introduction to RE
Tools and Commands
Monitoring Events and Exceptions
Inspecting Processes and Modules
Introduction to Firewalls
Network Firewalls
Web Application Firewalls
Weakness in Firewalls
Honey Pots and Security Misconfiguration