Distance Learning in Ethical Hacking (30 Days)

Register Now & Get Certified with our Distance Learning Program

CAPTCHA security code

For Any Assistance Call on +91-9990203445

  • Overview
  • Course
  • Project
  • Kit

OVERVIEW

This Program mainly focuses on the Individuals eager to Ethical Hacking through Distance Education. It features a brief introduction to the world of hacking starting with the importance of ethical hackers and their need in today's world scenario, including to the basics of networking that will help you have a deep understanding of the working of internet.
The duration of this module is 30 days. After completion of the Learning Section the Individual have to give examination on any working day within 3 Months, prior he/she has to lock the Examination Date within 2 days of completion of Learning Section.
On successful completion of the Program Individual will be provided with Certificate of Distance Learning Program certified by Robosapiens Technologies Pvt. Ltd.


Duration: 30 Days
Best Suited For: Individual Eager to Learn Ethical Hacking *
Fees: 6900/- (Including Courier Charge)
Project: 31 Projects Live
Training Kit: Robosapiens DLK (For details view KIT Tab)
Delivery: DLK will be delivered to you in 5 working days after receiving your payment
Examination: You can give exam on any working day within 3 Months #
Certification: DLC from Robosapiens Technologies Pvt. Ltd. @
Kits Source : logo-robomart

* Pre knowledge- Basic of Computer, Internet & Networking.
# corresponding to the exam date locked, you will receive the online exam sheet at 10:30AM and you have to submit the answer sheet online on the same day before 1:30PM.
@ Certificate will be issued only if you secure 50% or above marks in exam

1. Introduction to Ethical Hacking
  • What is hacking?
  • Who is a hacker?
  • Kinds of hackers.
  • What do hackers do?
  • Ethical Hacking & Its importance
2. Introduction to Networking
  • What is network?
  • Various topologies used in a network.
  • Networking devices and its working.

3. Introduction to Internet
  • Importance of internet?
  • Difference between intranet and extranet?
  • What is Google hacking and its benefits?
Live Project 1: Live demonstration of Google dorks.
Live Project 2: Magic of 94FBR
4. Windows OS Hacking
  • What is meant by Windows hacking?
  • What is command prompt in windows?
  • Major commands for Windows hacking.
  • How to create a bootable pen drive?
Live Project 3: Hacking through command prompt.
Live Project 4: Hacking through a live booting.

5. Phishing
  • What is phishing?
  • How to identify a phishing page?
  • How to create a phishing page?
  • How to create a local server?
  • What is url shortner?
Live demonstration 5: Creation of free domain
Live Project 6: Facebook account hacking on local server.
Live Project 7: Gmail account hacking on local server.
Live Project 8: Facebook account hacking on real server.
Live Project 9: Gmail account hacking on real server.

6. Steganography
  • A big confusion "Steganoraphy or Stenography".
  • Types of Steganography.
Live Project 10: Hide a text file in an image file.
Live Project 11: Hide a text file in an audio/video file.
Live Project 12: Hide executable file in an image file.
7. Social Engineering Attack
  • What is social engineering attack?
  • Impact of Social Engineering Attack?
Live scenario 13: A scenario showing social engineering attack
8. DOS ATTACK
  • What are dos attacks?
  • 'LOIC 'as a dos attack tool.
Live Project 14: DOS ATTACK on a weak website.

9. Fake Emails
  • What are fake emails?
  • How can we detect fake emails?
Live Project 15: Sending a fake email
10. Virus
  • What is virus?
  • What is batch programming
Live Project 16: Creation of a virus to automatically shutdown the computer.
11. Information Gathering
  • Importance of Information gathering?
  • Tools which can be used?
Live Project 17: Information gathering by NMAP?

12. MITM Attack
  • What is man in the middle attack?
  • MITM attack tools.
Live Project 18: Creation of virtual environment for mitm attack.
Live Project 19: Sniffing of username and password from a virtual network.

13. SQL Injection
  • What is SQL?
  • What is meant by SQL Injection?
  • How to search a link vulnerable for SQL injection?
Live Project 20: Preparation of MySql database & executing basic SQL commands required for hacking.
Live Project 21: SQL Injection to hack a website

14. Introduction to BackTrack
  • What is Backtrack?
  • What is Kali Linux?
Live Project 22: Installation of Backtrack 5.

15. More on Information Gathering
  • What is Information Gathering?
  • Information Gathering tools.
Live Project 23: Gathering Information through Dimitry.
Live Project 24: Information Gathering through LanWhoIs tool.

16. Worms, Trojans & Backdoor
  • What are Worms?
  • What are Trojans?
  • What are Backdoor?

17. Website Hacking
  • Website Hacking
Live Project 25: Website Hacking through Havij Tool.

18. WIFI Hacking (WEP/WPA2)
  • What is "Wifi Hacking"?
  • What is WEP Wifi Hacking?
  • What is WPA2 Wifi Hacking?
Live Project 26: Live Wifi Hacking.

19. DVWA
  • What is DVWA?
  • Importance of DVWA?
Live Project 27: SQL Injection attack through DVWA.
Live Project 28: XSS attack through DVWA.
Live Project 29: XSS attack on live website.

20. Session hijacking with Back Track
  • What is session hijacking?
  • Tool used.
Live Project 30: Session Hacking through Backtrack.

21. Session hijacking with Back Track
  • DNS Spoofing
  • What is DNS?
  • What is spoofing?
  • What is DNS Spoofing?
Live Project 31: Live DNS Spoofing.

Project to be Covered

  1. Live demonstration of Google dorks.
  2. Magic of 94FBR.
  3. Hacking through command prompt.
  4. Hacking through a live booting.
  5. Creation of free domain.
  6. Facebook account hacking on local server.
  7. Gmail account hacking on local server.
  8. Facebook account hacking on real server.
  9. Gmail account hacking on real server.
  10. Hide a text file in an image file.
  11. Hide a text file in an audio/video file.
  12. Hide executable file in an image file.
  13. A scenario showing social engineering attack.
  14. DOS ATTACK on a weak website.
  15. Sending a fake email.
  16. Creation of a virus to automatically shutdown the computer.
  17. Information gathering by NMAP?
  18. Creation of virtual environment for session hijacking.
  19. Sniffing of username and password from a virtual network.
  20. Preparation of MySql database & executing SQL commands.
  21. SQL Injection to hack a website.
  22. Installation of Backtrack 5.
  23. Gathering Information through Dimitry.
  24. Information Gathering through LanWhoIs tool.
  25. Website Hacking through Havij.
  26. Live Wifi Hacking.
  27. SQL Injection attack through DVWA.
  28. XSS attack through DVWA.
  29. XSS attack on live website.
  30. Session Hacking through Backtrack.
  31. Live DNS Spoofing.

DLK Content for Ethical Hacking

2x (Booklet with step by step Instructions)(Vol1 & Vol2)
5x (Tool Kit DVD)
    DVD 1
  • Zip Window Xp Vmx File
  • Zip Backtrack Vmx File
  • VMware-player
    DVD 2
  • Books
  • Software
  • Video Tutorial
    DVD 3
  • Backtrack ISO Image
  • Books
  • Software
  • Video Tutorial
    DVD 4
  • Window 7 Vmx File
    DVD 5
  • Backtrack Vmx File
Other required Tools and accessories etc.