Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

ETHICAL

ETHICAL HACKING
HACKING
ETHICAL HACKING
COURSE
ETHICAL HACKING
ETHICAL HACKING
ONLINE TRAINING
Career
in Ethical
Hacking

Why Build a Career in Ethical Hacking and Cybersecurity?

Demand is So High 8+ Job Roles


For Cybersecurity Pros & Career Paths

There are 3.5 million unfilled cybersecurity jobs Opportunity to work in almost every industry
globally. There is a shortage of talent and this and across various roles like Security Admin,
market has 0% unemployment. Cybersecurity Analyst, Security Consultant, and
5+ more roles.

5.1 Lakh Per Annum Guaranteed Growth


Average Salary in Job and Career

The average salary of a Certified Ethical Hacker By acquiring the right skills, you can be on your
in India is INR 5.10 LPA. In top countries, it is more way to building a fast-growing career in the
than $50,920. field of cybersecurity.

Work Remotely Opportunities in Both


for International Companies Public & Private Sectors

Numerous brands and organizations around As a cybersecurity professional, you have the
the world hire ethical hacking professionals for opportunities to work in both public and private
remote work and offer a lucrative package. sector organizations of all sizes.
Who Can Learn Ethical Hacking?
Learning Ethical Hacking becomes easier for you with proper guidance &
advanced projects by WsCube Tech’s cybersecurity expert trainers. You
can acquire this skill if you are:

College Student
Start shaping your career right from
college time by learning in demand ethical hacking skills.

Graduate
Time for you to upskill, prepare yourself for a bright future, and
kickstart a career in cyber security.

College Dropout
Not sure which career is right for you? Not finding any jobs?
Learn ethical hacking with us to instantly land your first job.

Looking to Switch Career


Not satisfied with your current job profile? Switch to ethical
hacking, one of the most demanded and highly-paid skills.
A Brief About
WsCube Tech
India’s Most Trusted IT Training Institute

WsCube Tech is a leading IT training institute and software


development company based in Jodhpur. Since 2010, WsCube Tech
has trained 1,50,000+ students and offered internship opportunities to
3,500+ candidates.

In addition, WsCube Tech is one of the fastest-growing tech-based


YouTube channels in India, with a community of 1.4+ Million
subscribers and 8+ Million monthly views.

With an expert team of trainers in various technological fields, the


institute has helped thousands of students across India and other
Asian countries to acquire new skills and explore high-paying career
opportunities.

Our learners are working at top brands, enterprises, and unicorns


across India and globally.
Our Flourishing Journey
Over The Last Decade

Start

Kushagra Bhatia, a
visionary entrepreneur, 2010
laid the foundation
of WsCube Tech in Worked on 200+Website
Jodhpur as a Web Projects. Expanded to
Development include training division.
Company. 2011 Introduced Classroom
based PHP and ASP.
NET courses for college
students.
The institute witnessed
great success which
2012
made us introduce
Advanced PHP Course Expanded the service
and Android App portfolio with Android/
Development Course. iOS app development,
2013 WordPress, and SEO.
There was high demand Launched Classroom
for more courses. That’s Training on iOS
when we Introduced Development, WorPress,
Training in C, C++, Java, and SEO.
2014
& Digital Marketing for
both college and school
students.

Won training
By now, we had worked
assigment from ISRO 2015
on 8K+ Projects &
and offered Web &
trained 3K+ Students.
Mobile Technology
Introduced CakePHP
training. Started Java
course. Created a
Training. Reached
2016 YouTube channel to
milestone of 5,000+
offer free tutorials.
students.
Adopted robust web
Introduced 2017
frameworks like NodeJS,
professional coures on AngularJS, and Lara-
Robotics, PLC-SCADA, vel for projects. Started
and Advanced Python. Python and Machine
2,000+ students and Learning Courses and
2018
working professionals trained 2,000+ students.
enrolled in these courses.

Crossed 50K+ YouTube


During the pandemic, 2019
Subscribers. Started
introduced LIVE classes
providing pre-recored
for most courses.
online courses. New
Doubled the frequency
courses were also
of videos published on
2020 launched for various
YouTube. Surpassed
programming
100K+ Subscribers.
languages.

Introduced Ethical
2021
Hit the milestone of Hacking & Penetration
1 Million subscribers Testing courses (both
on YouTube. More online and offline).
than 110 batches Published 1750+
(online+classroom) tutorials on YouTube
2022
run per month now,
and crossed 500K
with over 45 courses.
subscribers.

There is no looking back!

1.4+ Million 1:1 Pesonalized 3500+ Internship


Subscribers Mentorship Candidates
Why
Learn
Ethical
Hacking
With
WsCube
Tech
Only?
Trusted by 1.5+ Million Completely
Learners Practical-Oriented
We are the #1 preference of Ethical Hacking is a skill that
more than 15 lakh learners in India requires immense practice.
and Asian countries. Our training For that, we offer 100% practical
quality and support system training with regular assignments,
intrigue learners. assessments, and projects.

Online and Comprehensive


Offline Batches Curriculum
Ethical Hacking is a skill that The ethical hacking course by
requires immense practice. WsCube Tech includes India’s most
For that, we offer 100% practical comprehensive curriculum, cover-
training with regular assignments, ing all breadths and depths in de-
assessments, and projects. tail & practically.

Job Expert
Assistance Trainers

On course completion, we assist You will learn ethical hacking from


you with job interviews and resume expert trainers having 10+ years of
building. Next, your interviews are experience in the field. We ensure
arranged with top companies to high-quality training always.
help you land the job easily.

Industry-Recognized Hands-On Live


Certification Projects

The certificate you receive You will apply all the practices
on course completion is valid on real websites
nationally and internationally. (no dummies), do everything
You can easily share it, add it on your own, and make use of
to your resume, and explore premium tools.
great opportunities.
Dear Learner,
We know that we are influencing the foundations of
your future, and we take this responsibility very seriously.
With WsCube Tech, I ensure that you always get top-class
training backed by practical projects and future prospects.
As the proud founder of WsCube Tech, I wish you a
successful & thriving career.
All the best!

Kushagra Bhatia
Founder, WsCube Tech
Ethical Hacking
Course Curriculum
Master all Concepts of Ethical Hacking!

Module 01 Module 03
NETWORKING CONCEPTS SETTING UP ETHICAL HACKING LAB
What is Computer Networking? Installing Kali Linux in Virtual Box
How does Networking Work? Configuring Kali Linux
Types of Networks What is IP Address? Downloading a Good Wordlist
IPv4 vs IPv6
Installing Burp Suite Pro
Types of IP Address
Installing Acunetix Pro
Introduction to MAC Address?
And different tools with there Modules..
Role of Ports in Networking
Introduction to Router and its elements. Module 04
What is OSI Model and How does It Work? FOOTPRINTING AND RECONNAISSANCE
What is TCP/IP Model and How does It Work? What are Footprinting and Reconnaissance?
OSI vs TCP/IP Model Types of Footprinting & Reconnaissance
What are Network Protocols? Use of Footprinting & Reconnaissance
Types of Protocols
Footprinting Through Search Engines
How does TCP Work? TCP vs UDP
Footprinting using Advanced Google
What is Domain Name? What is DNS? Hacking Techniques
DNS Records and Their Uses What Footprinting Through Social Networking Sites
is Zone File?
Website Footprinting (Netcraft, Wappalyzer)
What is HTML Request? What is HTML
Response? Types of Request Methods Email Footprinting (Email tracker pro)

Capturing and Analysing Network Packets DNS Footprinting (DNSenum, DNS Lookup,
(Wireshark) MX Lookup, NS Lookup)
WHOIS Footprinting

Module 02 Footprinting Through OSINT Framework

INTRODUCTION TO ETHICAL HACKING Module 05


What is Ethical Hacking? Types of Hackers SCANNING NETWORKS (Ping, Nmap,
Types of Attacks on a System Zenmap, Messcan, armitage,hping3)
Cybersecurity Laws What is Network Scanning?
What is Linux? Network Scanning Methodology
Cool Features of Linux Types of Network Scans
Basic File System of Linux Checking for Live Systems and Buffer Size
Basic Linux Commands (Practical) Checking for Open Ports
Advance Linux Commands (Practical) Checking for Services on Ports
Checking for Software with versions
OS Fingerprinting & Banner Grabbing
Countermeasures
Saving xml report for Metasploit & Conversion
Course Curriculum

Module 06 Anonymous Configuration in Linux

ENUMERATION Accessing Dark Web (Tor Browser)

(Nmap, MSF, Armitage, NetCat ) Creating Dark Web Website (tor Server)

What is Enumeration?
Module 09
Types of Enumeration
SYSTEM HACKING
Default Ports
What is System Hacking?
How to Enumerate NetBIOS?
System Hacking Methodology
How to Enumerate SNMP?
Cracking Windows Password
How to Enumerate SMTP?
(Pwdump, ophcrack, lophcrack)
How to Enumerate NFS?
Creating a Good Password list (crunch)
How to Enumerate DNS?
Escalate Privileges in Linux
How to Enumerate all Services?
Escalate Privileges in Windows OS
Countermeasures
System Hacking using URL(Camera, Location,

Module 07 Passwords and more)

VULNERABILITY ASSESSMENT URL Masking


System Hacking using Open Ports (nmap,
What is Vulnerability Assessment? NetCat, MSF, Armitage, Exploit DB)
Classification of Vulnerability System Hacking using NetCat
Vulnerability Assessment Lifecycle What is Steganography?
Vulnerability Assessment Solutions Types of Steganography
Vulnerability Scoring Systems Steganography Practical (Open Stego)
Scanning for Vulnerability in Nmap scans
result (MSF, Exploit DB, Armitage)
Module 10
Vulnerability Scanning - ZAP (OWASP)
MALWARE THREATS
Module 08 What is Malware?
Being Anonymous Example of Malware
What is Trojan?
Understanding layers of Internet (Deep,
Dark, Surface & Hidden Web) What are Viruses and Worms?
Changing User Agent Types of Malware Analysis
(Random User Agent Switcher)
Static Malware Analysis
Changing MAC Address (Macchanger)
Dynamic Malware Analysis
Auto Run Shell Script (MAC Changer)
How to Create RAT Trojan? (HTTP, RAT)
Changing Wi-Fi MAC Address
Creating Payloads (MSF)
Configuring Proxy (Mannual and tor proxy)
Creating Undetectable Payloads
Configuring VPN (Free VPN)
Who is best for IP Anonymous?
Course Curriculum
Module 11 Module 14
SNIFFING SESSION HIJACKING
(Ettercap, macoff, yersinya, Wire- What is Session Hijacking?
shark, TCPDUMP) Why is Session Hijacking Successful?
What is Sniffing? Session Hijacking Process
How an Attacker Hacks the Network Using Types of session Hijacking
Sniffers? Performing Session Hijacking(Burp Suite
Active Scanning Techniques Professional, Ettercap)

Types of Sniffing Module 15


Protocols Vulnerable to Sniffing HACKING WEB SERVERS & WEB APPS
MAC Spoofing What is Web Server? Web Server Attacks
MAC Flooding Web Server Attack Methodology
DHCP Flooding Web Application Concepts
Setup DHCP Rouge (MITM Attack) Web Application Hacking Methodology
Sniffing with Wireshark Vulnerability Scanning
(Acunetix Pro, Nessus
Module 12
SOCIAL ENGINEERING
What is Social Engineering?
Types of Social Engineering
Human-based Social Engineering
Computer-based Social Engineering
Mobile-based Social Engineering
Social Engineering Using SET

Module 13
DOS & DDOS ATTACKS
What is DoS Attack?
What is DDoS Attack?
Basic Categories of DoS/DDoS
Attack Vectors
DoS in Networking (hping3, MSF, yersiniya)
DoS in Websites
DoS using Programs and Commands
(CPU and Memory Utilisations)
Course Curriculum
Module 16 Module 18
HACKING WIRELESS NETWORKS CRYPTOGRAPHY
What is Wireless Networking? What is Cryptography?
Types of Wireless Encryption Difference Between Encoding,
Hashing & Cryptography
Types of Wireless Threats
Types of Cryptography
Wireless Hacking Methodology
How it works?
Complete Hacking WEP (WI-FI)
Cryptography tools
Basic to Advanced Hacking
WPA/WPA2 (air packages) Hashing Tools
Encoding Tools
How to Jam Wi-Fi?

Module 19
Module 17
System Security using firewall, WAF
HACKING Mobile Platform
and antivirus
Mobile Platform Attack Vectors
(Vulnerable Areas) All about firewalls

OWASP Top-10 Mobile Risks- 2016 GUI Windows Firewall configuration

Mobile Platform Vulnerability and Risks GUI Linux Firewall configuration

Mobile Security Guidelines WAF in Linux Config – MOD

Calls, SMS, Email Bombing on Android Module 20


Generating Payloads (Basic to Advanced) Job Assistance and Career
Using Keylogger App Counselling
Info Gathering from G-Accounts Improve your Linkdin Profile
Android & IOS Security Scan (MVT, iMazing) How to create a good resume
Installing Termux in Android Demo Interview preparation
Installing Net Hunter Kali in Android how to select a domain in Cyber Security
Sources to get good Knowledge
Job/Placement Assistance
Once you complete the Ethical Hacking Course, you will get
advanced placement assistance to help you prepare for the job.
We will evaluate your skills, prepare you for the interview, and
arrange interviews with top companies.

Interview Preparation and Live Practice

Appealing Resume Building

Conducting Interviews at Various Companies

Internship Opportunities

Getting High-Paying Freelance Projects

Students We’ve Trained Work at Renowned Companies,


Startups, and Brands
Our Students Speak for Us!

Shubham Rohan Anshul


Bafna Tripathi Rawat

“I did not have knowledge “This is simply the best “ I’m glad I made the
of hacking before enroing ethical hacking course. decision to take this
in this course. However, Ashish sir did a great job course. Can’t appreciate it
everything was taught and put his heart into enough. I missed a few live
from scratch. Initially, I teaching all concepts of classes but they provided
thought I can’t do this. But the course. Whenever I me the recording and also
the way of teaching and had doubts, he was eager cleared my doubts in the
content is really simple to answer and helped me next classes.”
and great!” learn easily. Highly
recommended.”

Ankita Rituraj Gautam


Pareek Sharma Choudhary

“The trainer here makes “Thank you WsCube tech. I “I would like to thank the
the content easy to learn really learned a lot during trainer and WsCube Tech
and answers all the the entire ethical hacking for the enhanced training
questions during the training. The practicals, provided during the entire
classes. I learned a lot of exercises, and projects course. The trainer has
important concepts which were really good. I applied brilliant knowledge. The
looked so complex to me for a few jobs in the course content covers
when I started. I recom- cybersecurity field and beginner to pro. Also, sir is
mend this course to any- finally got placed with a a good motivator and
one who wants to learn good package.” friendly person.”
ethical hacking.”
Industry-Recognized
Certification
Become a Certified Data Scientist!

Live Online and Job Assistance Internships


Classroom Training for Faster Hiring for Experience
Culture &
Activities at
WsCube Tech Awarding Star Performers

We Are Difference Makers! Interview Preparation

Outings & Fun Activities College Seminars

Personal Assistance Workshops


Take Your Career’s Most
Important Step Today
Towards Building a Thriving Career in Ethical Hacking!

Course Duration: 2 Months

Fees: Call us for fee details as we offer varied discounts

Call Now to Book 2-Days of FREE Demo Classes: +91 90242-44886

Contacts Us:

www.wscubetech.com

/wscubetechindia

/wscubetechindia

/wscubetech.india

/wscubetechjodhpur
/wscubetechindia

You might also like