HACKCIEUX CERTIFIED EITHICAL HACKER (HCCEH)

Chrome

Course Description

This is an advanced course that is developed with the objective of laying the foundation stone which can potentially transform into a career in the cyber security space. Studenta will learn the latest hacking techniques in the filed of penetration testing and get acquainted with the latest tools available with the world-renowned Kali Linux. Each participant will have access to our remote virtual penetration testing labs for practicing the course materials. Penetration Testing Training with HackCieux attempts to simulate a full penetration test, from start to finish, by injecting the student into a rich, diverse, and vulnerable network environment.


How its done !!!

HackCieux makes it possible now to reach you with in your college or university in via our academic engagements.
One Month Training
Instructor led hands-on Training
8 hours
Number of Trainers: Minimum 2
8:2 Practical Theory Ratio



Course Contents

Expand each toggles to see the TOC in details.
Introduction to Information Security
  • In this module student will be introduced current cyber security challenges faced by enterprises by sharing cyber attacks case studies in the past year, along with career options available in the field of information security.
Basic of Networks
  • In this module students will be getting hand-on experience of IP Address, Classification Of IP, TCP, UDP, Port and other Networking Related Information.
Email attacks & Security
  • In this module we will talk about basic architecture of email along with various attacks associated with email security and security guidlines which will help an organisation to make an effective email security policy.
Penetration Testing: What you should Know
  • In this module students will learn about the most powerful Hacking destro: Kali Linux. And also Legal aspects of Cyber Space Security
Getting Comfortable with Kali Linux
  • In this module we will be talking about How to boot up Kali Linux in HardDrive also in Virtual Machine. And Getting Getting familiar with Kali Linux.
Managing Kali Linux Services
  • In this module we will be talking about Default root Password, SSH and HTTP Services.
Essential Tools
  • In this module student will learn how to use Netcat, Wireshark, Tcpdump and lots more other essential tools.
ARP Spoofing
  • In this module student will learn how to get Victim Packet, Gateway Packet. And will also learn how to use Ettercap and the concept of DNS Spoofing.
Active & Passive Information Gathering
  • In this module student will learn how to gather information both actively and passively using so many webbased tools and also by Email Harvesting, Netcraft, Whois.
Reverse Engineering
  • Reverse Engineering is the concept of rebuilding the software. Here we will trech the basic software structure and how to ypass the authentication or product registration. And also the details knowledge of Ollydbg and Immunity Debugger.
Hack Social Networking sites
  • In this module student will learn the basic structure of web based login form and how they works. In this module we will teach how to do Facebook, Gmail, Yahoo Mail spoofing.
Mobile Attacks & Security
  • Over 80% of smartphones on planet are running on android, Around 13% smartphones are running with iOS operating system. Hence, in this module is purely concentrated on making student understand these operating system's security architecture, we will be also talking about VOIP security.
Dark Web / Deep Web
  • Google indexing only 0.004% of the total Internet. So here comes the concept of Dark we and Deep web. In this module student will be learning about Dark web and deep web also how to access the dark web using tor browser.
Proxy Server & Proxy Sites
  • In this module student will be learning what is proxy server, what is the use of it and also how to use proxy server using the HackCieux proxy server list.
Working with Malware
  • In this module student will be learning about virus, worms, trojan, rat and so many malicious script. How the Malware affects our system and also how to attact remotely using Trojan.
Call and Sms Spoofing
  • In this module student will be learning how to spoof sms and call. How to change the voice pitch. And also how to stay safe from this types of attacks.
Port Scanning
  • In this module we will teach basics of the Port including TCP, UDP. Use of Nmap and also OS fingerprinting.
Vulnerability Scanning
  • In this module student will learn how to scan network and also webserver using vulnerability Scanner linke Nmap, OpenVAS, Nessus and the most powerful scanner: Nexpose.
Web Application Attacks
  • In this module student will learn the basic structure of web application. And how to attack web application using SQL Automated Tools, Using SQL Manually, also the Cross Site Scripting(XSS - Attack)
Password Cracking
  • In this module students will learn how password cracking happens.How to create Own Dictionary Files. Concept of Bruteforce Attacks. Also the use of Hydra, Ncrack, John the Ripper.
The Metasploit Framework
  • In this module students will learn how Metasploit Framework works. Getting Familiar with MSF Syntex, Meterpreter Payloads, Metasploit Exploit with Multi Handler.
Conclusion
  • In this module student will give a written exam as well as practical Exam in the ratio of 3:7. And after scoring 70%, we will pbe awarded by our HackCieux Certifed Ethical Hacker (HCCEH) Certificate.

We'll Provide

Benifits of our Workshop.

HackCieux CertificationParticipants will be provided with HackCieux Certified Cyber Security Expert (HCCCSE) Grade -1 certificate.

HackCieux Ninja ToolkitEach participant will get E-tool Kit with tools used during the workshop and other support software and Operating System.

HackCieux E-CookBookcandidates will be provided with Information Security Cook Book containing detailed specifics of the contents.

Oppertunity of Instant InternshipChance to get selected for the Internship in HackCieux based on the examination at the end of the course

Meet Our Team

Parthajit Dholey

Parthajit Dholey

CEO
Arnab Ghosh

Arnab Ghosh

Co-Founder
Chaite Saha

Chaite Saha

Security-Trainer
Rony Das

Rony Das

Web Penetration Expert