Ethical Hacking 12-Sept
Ethical Hacking 12-Sept
Ethical Hacking 12-Sept
In association with
About the Course
Welcome to the world of ethical hacking, where cyber security professionals use
their skills to identify vulnerabilities, weaknesses, and security flaws in computer
systems, networks, and applications. This course is designed to provide you with a
comprehensive introduction to ethical hacking, enabling you to understand the
techniques, tools, and methodologies employed to secure digital assets.
In Association With
As one of the finest institutions in the country, JAIN (Deemed-to-be University) creates
an exceptional space for an enhanced learning experience. The vibrant culture of the
University has embraced innovation, and its entrepreneurial perspective encourages
students, staff and faculty to challenge convention, lead discovery and explore new
ways of learning.
Ranked among the top universities in India and considered a cerebral destination for
students across the world and Bangalore in particular, for its illustrious history of
developing talent, JAIN (Deemed-to-be University) is a hub for learning in every sense
of the word.
The University which is based in Bangalore – the Silicon Valley of India, offers a
conducive environment for learning, be it academically or extracurricular activities.
Known for its emphasis on education, entrepreneurship, research and sports, JAIN
(Deemed-to-be University) has some of the best minds in the educational and
research fields, and centers that inspire entrepreneurship and groundbreaking work
to simplify and manage life better.
What makes JAIN (Deemed-to-be University) different is its outlook towards life, its
values and beliefs. Its ever-evolving and open-minded system and quest for
continued success and resilience, has made it one of the top universities in India.
The need of Ethical Hacking
Identifying
vulnerabilities 01 02 Strengthening
security measures
Protecting
sensitive data 03 04 Compliance
and regulations
Preventing
financial losses 05 06 Preparing for
cyber threats
Testing incident
response plans 07 08 Safeguarding
critical infrastructure
Course outcomes
Understanding of shell scripting, cryptography and steganography for Linux based systems
Understanding and identifying the use of password cracking, malware and trojans
Discovering vulnerabilities
in their employer's
networks and systems
Precluding vicious
bushwhackers from
penetrating and
stealing private data
Wireshark Netcat
Honeypots Kernel System basics
Cryptography &
Steganography Training Cycle 4
Basics of
Networking Training Cycle 3 Cryptography & Steganography
What is DNS
Ethernet Basics Cryptography &
Steganography Training Cycle 5
Honey pots
Wordlists
Creating Custom Wordlists using Crunchbase
Deepweb/Darkweb
Training Cycle 6 Hydra, Password Cracking
MAC Changer
Prerequisites
» Problem-Solving and Critical Thinking Skills
» Computer Skills
» Basic Knowledge About Hardware
Intermediary
Training Cycle
System Hacking & Social Engineering Attacks
Android Hacking Training Cycle 1
& WiFi Hacking Training Cycle 2
Introduction to
Web Pentesting Information Gathering
Training Cycle 3 Training Cycle 4
Bypassing Authentication
Scanning and Enumeration
IDOR Attack Training Cycle 5
Nmap
Prerequisites
Tools
» Problem-Solving and Critical Thinking Skills
» Nmap » Nikto
» Computer Skills
» Wireshark » Hyperterminal
» Basic Knowledge About Hardware
» Nessus / Qualys » Sherlock
» Must have completed Beginner Level or
Need to clear the Entrance Test » Metasploit » Iplogger
Expert
Training Cycle
Post Exploitation Pentest Report Writing
Training Cycle 1 Training Cycle 2
Maintaining Access
Prerequisites
Tools
» Problem-Solving and Critical Thinking Skills
» Cobalt Strike » Ghidra
» Computer Skills
» Microsoft Defender » Docker
» Basic Knowledge About Hardware
» Need Cloud » AlienOssec
» Linux Skills environment
» Netanalysis
» Basic understanding of Database » MALTEGO
» Msfvenom
» Basic understanding of windows and mac OS » MSOLspray
» Atom
» Must have completed Intermediate Level or
Need to clear the Entrance Test
Fee Structure
01
Beginner
Excl. of Taxes
02
02. Intermediary
Excl. of Taxes
Advanced / Expert
Course Duration
6 Weeks
Training Cycle
4 Modules
Course Fee
10,000/-
03
Excl. of Taxes
Program Highlights
Experienced Continuous
Instructors Assessment
and Feedback
Hands-on
Learning
Comprehensive Industry-Relevant
Curriculum Examples
Interactive Learning
Platform
Practical Projects
Certification
Supportive Learning
Community
Training Cycle
Identify your
strengths and
areas of
improvement
Define your
learning road
map Refine
Evaluate
Sharpen your
Practice acquired
skills and
head
towards
precision
Plan
Intense
hands-on
Assess projects and
assignments
Pre-course
assessment on
knowledge and skill
levels
Placement Highlights
120+ Hiring
Corporates 8 LPA
Average CTC
40% Average
Salary Hike 24 LPA
Highest CTC
www.codinius.com