Ethical Hacking Course
Ethical Hacking Course
Ethical Hacking Course
T R A I N I N G
www.ignitetechnologies.in
about
Well-Known Entity for Offensive Security
ABOUT US
With an outreach to over a million students
and over thousand colleges, Ignite Technologies stood out
to be a trusted brand in cyber security training and services
WHO
CAN
College Students
IS/IT specialist, analyst, or manager
IS/IT auditor or consultant
IT operations manager
Network security officers and WHY
Practitioners
Site administrators
Level up each candidate by providing the
Technical support engineer
fundamental knowledge required to begin the
Senior systems engineer
Sessions.
Systems analyst or administrator
Hands-on Experience for all Practical
IT security specialist, analyst, manager,
Sessions.
Architect, or administrator
Get Course PDF and famous website links for
IT security officer, auditor, or engineer
content and Tools
Network specialist, analyst, manager,
Customized and flexible training schedule.
Architect, consultant, or administrator
Get recorded videos after the session for each
participant.
Get post-training assistance and backup
sessions.
Common Platform for Group discussion along
with the trainer.
Work-in Professional Trainer to provide realtime
exposure.
Get a training certificate of participation.
ethical
hacking
misconfigurations. Beginners who wish to learn about the techniques and tools used by
type 1
A GROUP SESSION will have a maximum of 10 candidates
type 2
A PERSONALISED SESSIONS will one-on-one session.
Exploitation
Module 11: Social Engineering
Module 6: Enumeration
Complete Reconnaissance
stage 5
Module 13: Sniffing and Spoofing
Network Attacks
stage 1
Module 1: Fundamentals of Ethical Hacking
Module 4: Footprinting
In this module, the candidate will learn how to gather information against their target
with the help of online tools available on the Internet to fetch the information available
on the web.
Key pointers:
• OSINT Framework
• Email Footprinting
• DNS Footprinting
• Web FootPrinting
• Google Hacking Database
Tools: Shodan, Whois, DNS Dumpster, Exploit DB, Hunter, iplogger, OSINT, Httrack and
similar alternative tools
Tools: Nmap, Rpcclient, SMBmap, SMBclient, NBTScan and similar alternative tools
stage 3
In this stage, the trainer will focus on various tools and techniques used by hackers to
compromise the target machine by providing a conceptual and practical session on the
following Modules.
Tools: Trojans RAT, Virus Total, TCP View, Process Explorer, Ad blocker
stage 4
Module 10: Web Hacking
This module will define Standards and tools used by hackers to exploit websites by
injecting malicious code or commands.
Key pointers:
• Introduction to Web Server and Web Applications
• Well Know web servers and CMS
• Introduction to OWASP
• Website Scanning
• Introduction to burpsuite
• SQL injection
• Cross-Site Scripting
• Remote command Execution
• Brute Force
Phone No.
+91 9599 387 41 | +91 1145 1031 30
WhatsApp
https://wa.me/message/HIOPPNENLOX6F1
EMAIL ADDRESS
info@ignitetechnologies.in
WEBSITE
www.ignitetechnologies.in
BLOG
www.hackingarticles.in
LINKEDIN
https://www.linkedin.com/company/hackingarticles/
TWITTER
https://twitter.com/hackinarticles
GITHUB
https://github.com/ignitetechnologies