Learn how to successfully attack fully patched and hardened systems, circumvent common security controls and access confidential data and bring this knowledge back to your organization so you can formulate ways to defend against these sophisticated attacks. Learn how to fully utilize zero-day attacks that replicate an APT attack.
This module will discuss the first one – footprinting - the fine art of gathering target information.
In this module, we will determine what systems are listening for inbound network traffic (a.k.a. alive) and are reachable from the Internet using a variety of tools and techniques such as ping sweeps, port scans, and automated discovery tools. We will also look at how you can bypass firewalls to scan systems supposedly being blocked by filtering rules.
This module will begin with a brief discussion of banner grabbing, the most generic of enumeration techniques, and will then delve into more platform-specific mechanisms that may require more specialized tools.
In this module, we will study in detail how various tools used over the SMB "null session" can yield troves of information about Windows users, groups, and services.
We will leverage the copious amount of data gleaned from the previous modules to gain easy entry to Windows systems in this module.
While UNIX and UNIX-derived operating systems have evolved considerably over the past 30 years, the passion for UNIX and UNIX security has not subsided. Many ardent developers and code hackers scour source code for potential vulnerabilities. Furthermore, it is a badge of honor to post newly discovered vulnerabilities to security mailing lists such as Bugtraq.
In this module, we will explore this fervor to determine how and why the coveted root access is obtained. Throughout this module, remember that UNIX has two levels of access: the all-powerful root and everything else. There is no substitute for root!
With the writing of the fifth edition of this series, not much has changed when it comes to the technology aspect of those plain-old telephone system (POTS) lines, and yet many companies still have various dial-up connections into their private networks or infrastructure. In this module, we'll show you how even an ancient 9600-baud modem can bring the Goliath of network and system security to its knees.
In this module, we will discuss the means by which a target may be selected, profiled, and subsequently compromised, with little more than some simple tools and a healthy dose of patience.
In this module, we will discuss the more important security issues, countermeasures, and core technologies publicly identified in the 802.11 realm to date, from the perspective of the standard attack methodology.
By the end of this module, you should be able to design, implement, and use a modern war-driving system capable of executing most of the latest attacks on your wireless network—as well as defend against such attacks.
In this module, we'll walk you through the typical techniques used today to discover and enumerate your firewalls, and we'll discuss a few ways attackers attempt to bypass them. With each technique, we'll discuss how you can detect and prevent attacks.
This module will discuss DoS and DDoS from the perspective of an organization with an online presence, because such organizations are the most at risk from these attacks. We will focus primarily on defining a systematic approach to DoS mitigation rather than in-depth examination of DoS and DDoS tools, reflecting our belief that, while testing of simulated attacks is of course recommended, it's generally not productive to waste time with the idiosyncrasies of such tools when the basic premises upon which they work are well understood.
At the heart of nearly all security problems are vulnerabilities. Whether they are vendor vulnerabilities, web developer vulnerabilities, misconfigurations, or policy violations, these vulnerabilities create and wreak havoc on our everyday lives. These security weaknesses cause billions in damage every year and can overwhelm those who must recover from these situations. And while security products and services try to mask the core of the security problem by addressing only the symptoms of the problem, managing your vulnerabilities is the only true way to solve the problem at its core.
The core problem is that developers and administrators create vulnerabilities and security weaknesses in nearly everything they produce, whether that be a line of code or a policy enforced or a default setting on a server. So, we are the problem, which means only we can reduce it. This is the fundamental paradigm behind secure code. Although the entirety of this topic is beyond the scope of this module, we will cover all the vital areas in an attempt to educate you in the dark world of hacking code.
This module seeks to outline the scope of the web-hacking phenomenon and show you how to avoid becoming just another statistic in the litter of web properties that have been victimized over the past few years.
In this module, we will discuss about the most up-to date information from the frontlines of the battle against Internet end-user hacking. This module gives information about how to create a safer, more productive online experience.
Structure your learning and get a certificate to prove it.
Modern networks and systems are fully patched, hardened from attack and armored to the hilt with expensive security gear - but the bad guys still get in on a daily basis! How do they do this?
University of Emerging Technologies’ Ethical Hacking - Level 2 (Expert) will teach you how to successfully attack fully patched and hardened systems, circumvent common security controls and access confidential data.
You’ll bring this knowledge back to your organization so you can formulate ways to defend against these sophisticated attacks. By learning how to fully utilize zero-day attacks that replicate an APT attack, you become an extremely valuable member of any penetration testing team.
Total Duration of the course is 160 hours
University of Emerging Technologies provides you with Role based education, experiential learning, live classes, 24*7 live labs and live support, personalized machines, real life projects, industry oriented, job focused content along with career prep support.
Anyone with a desire to learn advanced ethical hacking skills
After the completion of the course at University of Emerging Technologies, you will be able to understand:
Casting the establishment (Footprinting, Scanning, Enumeration)
System Hacking(Windows, UNIX, Remote Connectivity and VoIP)
Network Hacking(Network Devices, Wireless Hacking, Firewalls, DOS Attacks)
Software Hacking (Web Hacking, Internet User Hacking)
Firm understanding of the Windows Operating System
Exposure to the Linux Operating System or other Unix-based operating system
Grasp of the TCP/IP protocols
Exposure to network reconnaissance and associated tools (nmap, nessus, netcat)
Programming knowledge is NOT required
University of Emerging Technologies' Ethical Hacking Experts Course Completion Certificate is awarded by The Emerging Tech Foundation, an Independent Not-for profit organisation globally recognised for the emerging technologies.
You will be working on the virtual live lab environment that we provide which will give you the access to all the tools and softwares required for this particular course. The stepwise guide for accessing these services will be available in the LMS and University of Emerging Technologies support team will assist you 24*7 in case you have any doubts.
This course includes eight assignment projects which will hone your skills as per current industry standards and prepare you for your future career needs.
The 2 industry-based certification projects will test your ability to work with real-world data set.
Your certification project is an opportunity for you to explore an interesting problem of your choice in the context of a real-world data set. Projects can be done by you as an individual, or in teams of 2-4 students. Educators and Academic Enablers will consult with you on your ideas, but of course the final responsibility to define and execute an interesting piece of work is yours. Your project will be worth 20% of your final class grade, and will have 4 deliverables:
Proposal: 1 page (10%)
Midway Report: 3-4 pages (20%)
Final Report: 5-6 pages (40%)
Poster Presentation: (30%)
In this course, you will learn about scenario-based examples and have hands-on experience to be able to utilize the tools and prompts.
Any computer with standard Windows and or Mac with at least 2 GB RAM and a Core-I3 processor.
Total duration of this course is 160 hours divided over a period of 7-8 weeks. Out of 160 hours, 60-80 hours are dedicated for online sessions and remaining for live practical sessions where you will be working on real life industry focused projects.
You will be spending a minimum of 12 hours for online sessions every week.
Using your LMS, you will always have access to the recorded sessions. And you can also make a special request to attend the live session in some other batch (on the basis of availability).
Virtual Lab is a cloud-based environment where you can execute all your practicals and assignments, work on real-life projects effortlessly.
Using these virtual labs, students can avail the various tools for learning, including additional resources and environment for the course. This will save students from all the hassle of downloading and maintaining these softwares in their own machine.
You’ll be able to access the virtual lab via your browser which requires minimum hardware configurations. If you are stuck somewhere, our support team is available 24*7 to help you out.
All the details to access virtual labs are available on you LMS.
You can interact with the educator during the class using the chat feature.
We provide 24*7 live support to all our students via live chat feature and email. Our academic enablers are always available to help you throughout the course.
Yes, you can interact with other students enrolled in the same course using the course forum where you can discuss about the class and the course material. In case you want to interact with students enrolled in some other course, you can do that using the common forum available for all. University of Emerging Technologies believes in community building and social learning by connecting learners to each other so that they can discuss concepts, work on projects, solve problems and share innovative ideas.
Yes, we have group projects so that students can engage with each other and share ideas.
You will be graded on the basis of weekly quizzes, assignments, lab engagements, midterm and final exams.
Our online classes are Instructor paced.
Yes, the course material is accessible to the students even after the course is over in the form or PDF documents and recorded lectures.
Yes, you will get assistance for job interviews. We have a dedicated team for career guidance and counselling.
Enrollment is a commitment between you and us in which you promise to be a successful learner and we promise to provide you with the best possible learning environment. Our sessions consist of online interactive live classes, live labs and 24*7 live support along with career prep support. Enroll with us and experience the complete learning environment instead of just a demo session.