Course description

In this Online Ethical Hacking Course you will learn from beginners to advanced level. You will start to learn from setting up lab so you can prepare your penetration testing lab at your home or office to practice and perform ethical hacking. First , you will learn how to install operating systems into virtualization like VMware.

In this course you will learn to perform Ethical Hacking or penetration testing step by step. You will learn to setup and configure hacking tools in your lab and then usage of it to perform most powerful attacks of hacking. In this course you will learn about penetration testing so instructor will demonstrate how you can perform hacking attack on your own devices in your computer network safely to find vulnerabilities of it and secure them.

This penetration testing course will brief you about computer network also. If you are already working as IT professional or System and network admin in IT industry, this course will help you a lot to secure computer computer network, operate computer network systems, designed computer network systems , monitor computer network systems.

This course will give you more confidence to work as ethical hacker or penetration tester in the live production environment.

This course is designed in a way you will learn from basic to advanced level.

In this course you will learn about most powerful hacking attacks like system hacking , password cracking , web server hacking , scanning networks , sniffing , DDos , web server hacking , web app hacking , enumeration , virus , Trojan , buffer overflow , SQL injection , firewall , ids , IPS , cryptography , wireless , session hijacking , mobile platform hacking , social engineering , Steganography , etc.

In this security course every attack performed in my own lab. This penetration testing course mainly focusing on practicals. This course will teach you step by step practicals that how you can penetrate your own computer networks and defend it from hacker's attack. This online penetration testing course will give you complete white hats skills.

This course is divided in phases like foot printing , scanning , gaining Access , maintaining and covering track.

We tried to make every practicals to be easy to understand however we are giving support to solve queries of students.

This ethical hacking course is designed for educational purpose only. We does not motivate anyone to launch attacks on internet or to your company's environment to damage other. We gives a tips and tricks that how attackers attack on network and how we can defend it by attacking on our own networks and devices. We use our own computer network systems to perform Ethical hacking that we have full permission to launch attack.

What you will learn:

  • What is virtualization?
  • Ethical Hacking terms and ethics
  • Phases of hacking
  • Attack categories and vectors
  • Concepts of footprinting
  • Search engine tools
  • Hacking using google tool
  • Website recon tools
  • Metagoofil tool
  • Email headers and footprinting
  • DNS tool
  • Network scanning overview and methodology
  • Port discovery
  • Network scanning tools
  • Stealth idle scanning
  • OS and application fingerprinting
  • Vulnerability scanning
  • Network mapping tools
  • Proxy servers
  • Enumeration concepts
  • Netbios enumeration
  • SNMP enumeration
  • LDAP enumeration
  • NTP enumeration
  • SMTP enumeration
  • System Hacking concepts
  • Password cracking
  • Sniffing ( Man in the middle attack)
  • Rainbow crack
  • Password reset
  • DHCP starvation
  • Remote Access method
  • Spyware
  • NTFS alternate data stream exploit
  • Steganography
  • Covering track
  • Malware overview , malware analysis,
  • Trojan concepts , creating trojan
  • Virus
  • Switching security concepts and attack
  • DHCP snooping
  • ARP inspection
  • Social engineering
  • Denial of service attack
  • Session Hijacking
  • Hacking Web Servers
  • Buffer overflow
  • SQL injection
  • Web app vulnerabilities
  • Wireless hacking concepts
  • Mobile Hacking
  • Firewall
  • IDS and IPS
  • Honeypots
  • Encryption concepts

Course curriculum

  • 1


  • 2

    Introduction of this course

  • 3

    Preparing lab setup

    • Building a lab concepts

    • Building a lab concepts - Networking

    • Installing kali linux operating system

    • Configuring static ip on kali linux

    • Adding metasploitable2 into vm

    • Installing windows 8 operating system into vm

    • Installing windows 10 operating system into vm

    • Installing windows server 2012 into vm

    • Installing windows server 2016 into vm

  • 4

    Introduction of ethical hacking

    • Introduction of ethical hacking

    • What is ethical hacking?

    • What do ethical hackers do?

  • 5

    Footprinting And Reconnaissance

    • Overview of footprinting

    • Footprinting a target network using ping command

    • Footprinting a target network using nslookup command

    • People search using online tools part 1

    • People search using online tools part 2

    • Analyzing domain and ip address

    • Network route tracing

    • Tracing an email

    • Collect information of target website

    • Mirroring website

    • Extracting company's website

    • Information gathering - The harvester tool in kali linux

    • Information gathering - the metagoofil tool in kali linux

  • 6

    Network scanning

    • Network scanning

    • Performing network scanning

    • Scanning system and network resources

    • Banner Grabing

    • Scanning a network using netscan tool pro

    • Network topology mapper

    • Vulnerability scanning using nessus

    • NMAP

    • HPING3

    • Proxy server theory

    • Proxy server demo

    • Proxy server demo 2

  • 7


    • Concepts of enumeration

    • Network enumeration using netbios

    • SNMP enumeration concepts

    • SNMP enumeration demo

    • NTP enumeration

    • SMTP enumeration

    • LDAP/Active directory enumeration concepts

    • LDAP/Active directory enumeration demo

  • 8

    System Hacking

    • Hacking windows using metasploit and post exploitation using meterpreter

    • Exploiting client side vulnerabilities

    • Escalating privileges by exploiting client side vulnerabilities

    • Escalating privileges by exploiting client side vulnerabilities part 2

    • Password cracking concepts

    • Password sniffing concepts

    • Privileges escalation concepts

    • Password cracking algorithm concept

    • Man in the middle attack

    • Dump sam databases - Gathering password's hash value

    • Generate rainbow table

    • Cracking password using rainbow table

    • Auditing password of remote machine

    • System monitoring by executing application remotely

    • NTFS alternate data stream exploit

    • Spyware

    • Find hidden NTFS alternate data stream

    • Hiding data using whitespace

    • Image steganography

    • Steganography using openpuff

    • Clearing cover track - viewing, enabling and editing audit policy

    • DHCP attack

  • 9

    Trojans, Viruses and Worms

    • Overview of trojan

    • Creating trojan

    • Overview of viruses

    • Virus creation

  • 10

    Social Engineering Method

    • Social engineering toolkit part 1

    • Social engineering toolkit part 2

  • 11

    Hacking Web Server

    • How web server works

    • How Web Server Compromised

    • How are web server defaced

    • Hacking web server demo

  • 12

    DoS - Denial of service attacks

    • DoS concepts

    • DDoS concepts

    • DoS demo

  • 13

    Session Hijacking

    • Hijacking HTTPS traffic

    • Performing a MITM attack and hijack session using driftnet and urlsnarf

  • 14

    Web App Vulnerabilities

    • Web app vulnerabilities wordpress

  • 15

    IDS,Firewalls and Honeypots

    • Bypassing a firewall and maintaining a persistent connection with a target machine

  • 16

    SQL injection tips and methods

    • What is SQL Injection

Meet your instructor!

Vishal Patel
IT Instructor, System and Network Administrator, Entrepreneur

I am Vishal Patel. I am working as IT instructor. I have great experience with IT technologies. I have more than 8+ years of experience as IT professional. I am very passionate to work as instructor. I handled technologies like windows servers, linux, Cisco devices, storages, cloud, backup systems, database servers, application servers, mail servers, wireless technologies, network cabling, desktop computers, computer repairing, laptop repairing, IT security. I have also worked with software based companies as system and network administrator.  I have completed my graduation in Infrastructure Management Service and also did some professional courses to jump into IT world. I have taken professional training of Comptia A+, Comptia N+, Comptia Security+ , Comptia Server+, Comptia IT Fundamentals, CCNA, CCNP, MCSA, MCSE, RHCSA, RHCE, CCSA, SCSA, Exchange Server, Wireless Networking, Checkpoint Firewall, Linux Shell Programming, Cloud Computing, Ethical Hacking.

I have 6+ years of experience as trainer for classroom based training. I was providing training for all the above certification and technologies as classroom based trainer.

My vision is to provide quality training to the students and to make their life easy and secure their career.

I have also worked for many international client to setup their network.

I have extensive industry experience in the following areas:

Desktop Support Executive Role , Server Administrator Role , Network Administrator Role , IT Security Professional Role, System Administrator Role

Manage IT assets and documentation

Manage Hardware Servers like Dell Power Edge , Blade Center S , HP Prolint , IBM Tower 3500 M4 , Dell Power Edge T20 , Lenovo Think Center E70 , IBM 3200 M3 , Dell Power Edge R730 Rack Server

Manage Firewalls like Sophos XG135 , Sonicwall SOHO , Cyberoam 100ing , Dell NSA 4600 , NSA 2600

Handling Network Devices like Cisco Switches , Cisco Routers , Wireless Access Points , Wireless Routers , Cabling , Printers , Scanners , Web Cameras , Bio Metrics Devices , NAS , SAN

Manage Thin Client Systems , bandwidth management like broadband and leased line

I have good experience with Linux servers and Windows based servers like centos 6 , centos 7 , windows servers 2003 , windows server 2008, windows server 2012 , windows server 2016 , Red Hat Enterprise Linux 6 and 7

I have also good experience with LDAP , Active Directory , DNS , DHCP , IIS , Apache , Mysql , MS SQL, Microsoft Dynamic CRM 2012 and 2016 , SNMP , NFS , CIFS (SAMBA Server)

I have good experience with AWS , Azure , Google Cloud , Office 365 , G Suit , Zimbra Mail Server , Vmware Esxi , Vmware Vcenter

I have good experience with backup system like handling backup of database servers , application servers , data. Managing backup online and offline both

Good experience with storages like NAS , SAN , SCSI , LVM , Storage Servers

I have also good experience VPN, VLANs, Port Security , NAT , VPN , SSL VPN , IPSec , IDS , IPS

Managing network monitoring systems using nagios and cacti

Good experience with ticket management system

Good experience with applications like Redmine , Collabnet SVN , Team Foundation Servers, Test Links , Servers Monitor , Wireshark etc..

Handle Remote infrastructure management like datacenters and other location branches

Providing IT help desk supports to the clients and employees

I have also experience of educational field like provide training of IT-IMS based training like Hardware, Network, Microsoft Sever and Client, Linux Server, Cisco Router and Switches, Sun Solaris Server, Ethical Hacking, Security, EMC Storage, Exchange Server, Virtualization, Firewall (Cisco and Checkpoint)  etc…