- Instructor: mrweb
- Lectures: 103
- Duration: 5 weeks
What is Ethical hacking?
Ethical hacker is a person who hacks into a company’s Network or web app in order to secure there Digital Enviroment.Ethical hacker basically has the Authority to hack the network or web app in order to test the weaknesses available in the web app or network. Ethical hacking is the process where company hire a Good hacker or security researcher in order to test their Website security, Network Security, Cloud security and other aspects in digital word.
Inquire now to Get Huge Discount
There are various types of hacker
1.White hat hacker
White hat hacker works for a company in order to test or evaluate their security risks
He is employee of that particular company and helps them to secure their Digital word and get paid in mode of salary from that particular company.
2.Black hat hacker
A black hat hacker is unethical hacker who hacks in to web app or network in order to break their security for financial gain and name & fame. He doesn’t care about security his moto is to make damages to Digital security words
Here is the list of top 10 Notorious hacker in world and what punishment they got.
3.Grey hat hacker
Grey hat hacker is a guy who doesn’t work for any company or organisation. He hacks into a network and without disclosing the vulnerability he reports that vulnerability to concern department of that company who he hacked
Check out our bug bounty course
Can I Become hacker?
Yes. Anyone who aspire to be a hacker can become an ethical hacker. You should have open mind unique thinking in order to become Elite hacker. Ethical hacking always been an interesting and energetic field in the world of Information technology.
What are the steps to become an Elite hacker?
Join ethical Hacking course , certified ethical hacking course , Network security courses cyber security course in Mumbai , cyber security course
Learn from basic to advance
Mrwebsecurity is one the Top 10 ethical hacking institute in Mumbai who provide all cyber security course in Mumbai | Thane | Andheri as well.
These are the courses you need to do in order to Become Elite hacker.
1.Ethical hacking and cyber security – ethical hacking course in India
These courses will help you to become Elite and Ethical hacker in India.
How can I earn money by learning hacking?
You can earn money by reporting vulnerability to various available platform on the internet i.e.
1.Hacker one
2.Bugcrowd
To start this, you must complete Advance diploma in Cyber security from Mrwebsecurity
Ethical Hacking course
Ethical Hacking institute in Mumbai
Ceh v11 CEH v11 from Ec council
Ethical Hacking course in Pune
-
Introduction to Hacking
-
Lecture 1.1What is Ethical hacking?
-
Lecture 1.2Types of hacker
-
Lecture 1.3VA/PT Introduction
-
Quiz 1.1Ethical Hacking30m
-
Lecture 1.4intro30m
-
-
Networking
-
Lecture 2.1Basic Introduction to Networking
-
Lecture 2.2IPv4/IPv6
-
Lecture 2.3Protocols
-
Lecture 2.4Topology
-
-
FootPrinting
-
Lecture 3.1Gathering Info
-
Lecture 3.2whois Info
-
Lecture 3.3Domain Info/Top-& low-Level Domain
-
Lecture 3.4registry registrant registrar
-
Lecture 3.5Buying Domain
-
Lecture 3.6Subdomain Scanner
-
-
Scanning
-
Lecture 4.1Nmap scan
-
Lecture 4.2Owasp zap scanner
-
-
Google Hacking
-
Lecture 5.1How googles works
-
Lecture 5.2using google search operators
-
Lecture 5.3Adminlogin.php
-
Lecture 5.4Hacking CCTV(Random)
-
Lecture 5.5Taking control of CCTV
-
Lecture 5.6Robots.txt
-
Lecture 5.7Countermeasures
-
-
Malware, Trojan & System Hacking
-
Lecture 6.1What is malware?
-
Lecture 6.2Creating virus
-
Lecture 6.3Infecting Systems
-
Lecture 6.4Taking control of system
-
Lecture 6.5Encrypting Virus/malware
-
Lecture 6.6Testing files for securing systems
-
Lecture 6.7Using Tools to remove virus/Malware
-
Lecture 6.8Securing Android Device
-
Lecture 6.9Countermeasures
-
Lecture 6.10Sniffing30m
-
-
Andriod Hacking
-
Lecture 7.1What is android?
-
Lecture 7.2Using tools on android Device
-
Lecture 7.3using metasploit to hack android device
-
Lecture 7.4Taking full control of android device
-
Lecture 7.5Accessing Files
-
Lecture 7.6Web cam recording ,web cam snap,webcam stream.
-
Lecture 7.7Voice Recording
-
Lecture 7.8Securing Android device
-
Lecture 7.9Countermeasure
-
Lecture 7.10Android Hacking30m
-
-
SQL Injection
-
Lecture 8.1What is SQL
-
Lecture 8.2Database Introduction
-
Lecture 8.3Finding if web is vulnerable or not
-
Lecture 8.4Gainning access to database
-
Lecture 8.5Finding admin info
-
Lecture 8.6Finding admin page and Logging in successfully
-
Lecture 8.7Countermeasure
-
Lecture 8.8sqli30m
-
-
VPN, Hiding Identity ,Dark web
-
Lecture 9.1What is VPN?
-
Lecture 9.2How to Change your location
-
Lecture 9.3Tools to used
-
Lecture 9.4Accessing Dark Web
-
Lecture 9.5Using to Browser
-
Lecture 9.6Countermeasure
-
-
Cross Site Scripting
-
Lecture 10.1what is Xss
-
Lecture 10.2types of Xss
-
Lecture 10.3Is it vulnerble?
-
Lecture 10.4Redirecting
-
Lecture 10.5Getting access of cookies
-
Lecture 10.6Login using cookies
-
Lecture 10.7Countermeasure
-
Lecture 10.8cross site Scripting30m
-
-
Social Media Hacking
-
Lecture 11.1What is social media hacking
-
Lecture 11.2Social Engineering
-
Lecture 11.3Phishing
-
Lecture 11.4How to Detect phishing
-
Lecture 11.5Countermeasures
-
Lecture 11.6Social media hacking30m
-
-
Email Security
-
Lecture 12.1How E-Mail Works
-
Lecture 12.2Sending Fake E-Mail
-
Lecture 12.3Verifying Mail
-
Lecture 12.4Mail Client Sniffers
-
Lecture 12.5Countermeasures
-
-
Password Cracking
-
Lecture 13.1What is Brute force ,Dictionary Attack
-
Lecture 13.2Protecting PDF Files
-
Lecture 13.3Breaking Pdf Files
-
Lecture 13.4Countermeasures
-
Lecture 13.5Password Cracking30m
-
-
Cryptography and Stenography
-
Lecture 14.1What is Cryptography and Stenography?
-
Lecture 14.2MD5
-
Lecture 14.3Using tools
-
Lecture 14.4Cracking Securing hash
-
Lecture 14.5Stenography tools
-
Lecture 14.6Countermeasures
-
-
Physical Security
-
Lecture 15.1What is Physical Security
-
Lecture 15.2Tools to use
-
Lecture 15.3Countermeasure
-
-
Wireless Hacking
-
Lecture 16.1What is WEP/WPA/WPA2
-
Lecture 16.2Tools to analyse Network
-
Lecture 16.3Handshake
-
Lecture 16.4Hacking Wi-FI
-
Lecture 16.5Taking control over wifi
-
Lecture 16.6Countermeasures
-
Lecture 16.7WiFi hacking30m
-
-
Cyber Forensics
-
Lecture 17.1What is Forensics?
-
Lecture 17.2Recovering lost data
-
Lecture 17.3Tracking users on website
-
Lecture 17.4Checking logs
-
Lecture 17.5Analyzing the Logs
-
Lecture 17.6Computer Forensics30m
-
(1) Comment