Book Online Tickets for ETHICAL HACKING INTERNSHIP, Chennai.  Course outcomes This course needs a period of 8 days to master the Ethical Hacking major topics. This Course period covers the below. Students can find the Vulnerabilities present in the web application and servers Participate in Responsible Di

ETHICAL HACKING INTERNSHIP

 

Invite friends

Contact Us

Page Views : 73

About The Event

 Course outcomes This course needs a period of 8 days to master the Ethical Hacking major topics. This Course period covers the below. Students can find the Vulnerabilities present in the web application and servers Participate in Responsible Disclosure Program of Tech gaints like Google, FB and more Gain a internship from leading cyber security firm Placement Assistance based on performance Gain a certificate from leading security Free access to LetsHack Foundation Hackathon for two years. Day 1 : Introduction to Ethical Hacking and Virtual Machines Basics Methodologies of Hacking What hackers really do How good hackers earn money A big picture of Cybersecurity How Cybersecurity companies really work OWASP 10 Hacking methods Installing a Virtual Machine Introduction to Linux Linux Basics Introduction to GitHub and Git - Import Day 2 : Basics on Hacking Information Gathering Introduction to information gathering tools Using Google for Hacking Opensource tools for hacking Scanning the target Types of scanning Using Opensource tools for scanning Hacking servers during scanning Day 3 : Introduction to some advanced tools and OWASP Top 10 Vulnerabilities Burpsuite Metasploit Wireshark Top 10 Vulnerabilities discussion OWASP #1 Vulnerability C Y B E R S E C U R I T Y C O U R S E C U R R I C U L U M This Course needs a period of 8 days to master the Ethical Hacking major topics. This Course period covers the below. Day 4 : OWASP #2 Vulnerability Broken authentication and session management Insecure Direct Object References - IODR Buffer Overflow Attacks Day 5 : OWASP #3,4 Vulnerability Sensitive Data exposure Broken Access Control XML external entities Day 6 : OWASP #5,6 Vulnerability Security Misconfiguration Cross site scripting (XSS) Types of XSS Bypassing WAF for XSS Day 7 : OWASP #7,8 Vulnerability Cross Site Request Forgery-CSRF attacks Components using known vulnerabilities Improper Authentication Improper Authorization Day 8 : OWASP #9,10 Vulnerability Unvalidated Redirects and Forwards Insufficient logging and monitoring

More Events From Same Organizer

Similar Category Events