Expert in Oracle PL SQL Training Crash Course
Expert in Oracle PL SQL Training Course By Elevate Academy Team DB Management Course World Class Instructor 1:1 with Industry…
Elevate Academy is a recognized leader in cybersecurity education, offering a comprehensive Certified Hacking Defender Course designed to equip participants with the knowledge and skills needed to effectively identify, prevent, and respond to cyber threats. This program provides in-depth training in ethical hacking techniques and security practices to help protect critical systems and data.
This course is part of a carefully selected collection of top-rated programs recommended by companies worldwide for employee training and cybersecurity development.
The Certified Hacking Defender Course equips individuals with the essential skills and knowledge required to defend against cyber threats and hacking attacks. Participants will learn a variety of defensive strategies and techniques to safeguard systems, networks, and data from unauthorized access, exploitation, and compromise. The course combines theoretical concepts with practical exercises to prepare learners for real-world cybersecurity challenges.
This course aims to provide comprehensive knowledge of hacker tactics and techniques to enhance defense capabilities. It equips participants with the skills necessary for vulnerability assessment, penetration testing, and network security management. Additionally, it fosters a deep understanding of endpoint security measures and incident response protocols to strengthen overall organizational security.
Computer Hardware
Motherboard
RAM
Storage
Mobile Equipment
Laptop
Processor
Network Devices
Routers
Switches
Access Points
Firewall
Hub
Power over Ethernet (PoE)
Injectors
Cable Modem
Network Interface Card
Protocols for Router and Switch
Logical Ports
Hacking
What is Hacking
Types of Hackers
Who is called Hackers
Life Cycle of Hacking
About Ethical Hacking
What is Ethical Hacking?
What is Ethics?
Engagements and Reports
Terminology Crash
Confidentiality
Integrity
Availability
Legal Considerations
Ethics and Legality
Define the job role of an ethical hacker
Understand ethical hacking terminology
Understand the different phases involved in ethical hacking
Identify different types of hacking technologies
List the 5 stages of ethical hacking
What is Hacktivism?
List different types of hacker classes
Define the skills required to become an Ethical hacker
What is Vulnerability Research?
Describe the ways of conducting ethical hacking
Understand the legal implications of hacking
Review of Everything
Number Systems
Networking
TCP/IP
Subnetting
Domain Name
IP Address
Employee Information
Emails
Footprint
What is Footprint?
Purpose of Footprints
Types of Footprints
About Ethical Hacking
What is Ethical Hacking?
What is Ethics?
Engagements and Reports
Terminology Crash
Confidentiality
Integrity
Availability
Legal Considerations
Ethics and Legality
Define the job role of an ethical hacker
Understand ethical hacking terminology
Understand the different phases involved in ethical hacking
Identify different types of hacking technologies
List the 5 stages of ethical hacking
What is Hacktivism?
List different types of hacker classes
Define the skills required to become an Ethical hacker
What is Vulnerability Research?
Describe the ways of conducting ethical hacking
Understand the legal implications of hacking
Review of Everything
Number Systems
Networking
TCP/IP
Subnetting
Domain Name
IP Address
Employee Information
Emails
Footprint
What is Footprint?
Purpose of Footprints
Types of Footprints
Reconnaissance
What is Reconnaissance?
Reconnaissance Methodology
Information Gathered Through Footprinting
Surveying the Attack Surface
Recon Types and Goals
Passive Reconnaissance (Part 1)
Passive Reconnaissance (Part 2)
Active Reconnaissance
Recon Walk-through and Tools Summary
Determine the Network Range
Fingerprint the Operating System
Uncover Services on Ports
Map the Network
Ethical Fingerprint
What is Fingerprint in Ethical Hacking?
Purpose of Fingerprinting
Types of Fingerprints
TTL (Time To Live)
Window Size
DF (Don't Fragment)
TOS (Type of Service)
Scanning Networks
What is Scanning Networks?
Purpose of Scanning Networks
Types of Scanning in Ethical Hacking
Scanning Methodology
Ping Sweep Techniques
nmap Command Switches
Syn, Stealth, Xmas, Null, IDLE & FIN Scans
Proxy Servers & Attack HTTP Tunneling Techniques
DP Spoofing Techniques
List the Scanning Tools
Enumeration
What is Enumeration in Ethical Hacking?
Purpose of Enumeration in Ethical Hacking
DNS Enumeration
NTP Enumeration
SNMP Enumeration
Linux/Windows Enumeration
SMB Enumeration
System Hacking
Understanding password cracking techniques.
Understanding different types of passwords.
Identify various password cracking tools.
Understand escalating privileges.
Understanding keyloggers and other spyware technologies.
Understand how to hide files.
Understand rootkits.
Understand steganography technologies.
Understand how to cover your tracks
Trojans and Backdoors
What is a Trojan?
What is meant by overt and covert channels?
List the different types of Trojans.
What are the indications of a Trojan attack?
Understand how "Netcat" Trojan works.
What is meant by "wrapping"?
How do reverse connecting Trojans work?
What are the countermeasure techniques Storage in preventing Trojans?
Understand Trojan evading techniques.
Sniffing
Understand the protocol susceptible to sniffing.
Understand active and passive sniffing.
Understand ARP poisoning.
Understand Ethereal capture and display filters.
Understand MAC flooding.
Understand DNS spoofing techniques.
Describe sniffing countermeasures.
Denial of Service
Understand the types of DoS Attacks.
Understand how DDoS attack works.
Understand how BOTS/BOTNETS work.
What is a "Smurf" attack?
What is "SYN" flooding?
Describe the DOS/DDOS countermeasures.
Web Application Vulnerabilities
Social Engineering
What is social engineering?
What are the common types of attacks?
Understand dumpster diving.
Understand reverse social engineering.
Understand insider attacks.
Understand identity theft
Describe phishing.
Understand online scams.
Understand URL obfuscation.
Social engineering countermeasures.
Session Hijacking
Understand spoofing vs. hijacking Home.
List the types of session hijacking.
Understand sequence prediction
What are the steps in performing session.
Describe how you would prevent session.
Hacking Web Servers
List the types of web server vulnerabilities.
Understand the attacks against web servers.
Understand Web Application Scanner.
What is the Metasploit Framework?
Understand IIS Unicode exploits
Understand patch management techniques
Describe web server hardening methods
Web Application Vulnerabilities
Understanding how a web application works
Objectives of web application hacking
Anatomy of an attack
Web application threats
Understand Google hacking
Understand web application countermeasures
Web-Based Password Cracking Techniques
List the authentication types
Authentication types include password-based, token-based, biometric-based, and multifactor authentication.
/What is a password cracker?
A password cracker is a tool or program used to recover passwords from data that has been stored or transmitted by a computer system.
How does a password cracker work?
Password crackers use various techniques such as dictionary attacks, brute-force attacks, rainbow table attacks, and hybrid attacks to guess or recover passwords.
Password attacks - classification
Password attacks are classified into offline attacks (where attackers have access to hashed passwords) and online attacks (attempting to guess passwords through direct access to login interfaces).
Password cracking counter measures
Countermeasures include using strong passwords, implementing multi-factor authentication, limiting login attempts, encrypting password databases, and monitoring for suspicious activities.
SQL Injection
What is SQL injection?
SQL injection is a code injection technique that attackers use to exploit vulnerabilities in SQL database queries to execute malicious SQL statements.
Understand the steps to conduct SQL injection
Steps include identifying vulnerable input fields, crafting malicious SQL queries, exploiting the vulnerability to extract or modify database contents.
Understand SQL Server vulnerabilities
SQL Server vulnerabilities include improper input validation, weak authentication mechanisms, and insufficient database permissions.
Describe SQL injection countermeasures
Countermeasures involve using parameterized queries, input validation and sanitization, least privilege principle, and regular security assessments and patches.
Wireless Hacking
Overview of WEP, WPA authentication systems and cracking techniques
WEP and WPA are wireless security protocols. WEP is vulnerable to attacks like packet sniffing and key cracking. WPA has stronger encryption but also has vulnerabilities.
Overview of wireless sniffers and SSID, MAC spoofing
Wireless sniffers capture wireless traffic, while SSID and MAC spoofing involve impersonating legitimate network access points or clients.
Understand rogue access points
Rogue access points are unauthorized wireless access points deployed within a network, posing security risks.
Understand wireless hacking techniques
Techniques include brute-force attacks against wireless encryption, exploiting weak configurations, and using tools like Aircrack-ng for packet sniffing and analysis.
Describe the methods of securing wireless
Secure wireless networks by using strong encryption (e.g., WPA2), disabling SSID broadcast, enabling MAC address filtering, updating firmware, and monitoring for rogue APs.
Virus and Worms
Understand the difference between a virus and a worm
A virus is a malicious program that attaches itself to other executable files, while a worm is a standalone malicious program that replicates itself and spreads across networks.
Understand the types of viruses
Types include file viruses, boot sector viruses, macro viruses, polymorphic viruses, and multipartite viruses.
How a virus spreads and infects the system
Viruses spread through infected files, email attachments, malicious websites, and removable media. They infect systems by modifying or deleting files, stealing data, or causing system malfunctions.
Understand antivirus evasion techniques
Evasion techniques include polymorphism (changing virus code), encryption, obfuscation, and using rootkits to hide malicious activities.
Understand virus detection methods
Detection methods include signature-based detection, heuristic analysis, behavior-based detection, sandboxing, and using antivirus software and firewalls.
Physical Security
Physical security breach incidents
Incidents include unauthorized access, theft, vandalism, and natural disasters affecting physical assets.
Understanding physical security
Physical security involves measures to protect physical assets, facilities, and resources from unauthorized access, damage, or threats.
What is the need for physical security?
Physical security is needed to safeguard personnel, prevent theft, ensure business continuity, comply with regulations, and protect sensitive information and assets.
Who is accountable for physical security?
Accountability lies with facility managers, security personnel, and organizations' leadership responsible for implementing and maintaining physical security measures.
Factors affecting physical security
Factors include location, facility design, access control systems, surveillance technology, security personnel training, and budget constraints.
Linux Hacking
Understand how to compile a Linux kernel
Compiling a Linux kernel involves configuring kernel options, compiling source code, and installing the resulting kernel image.
Understand GCC compilation commands
GCC commands include gcc for compiling C programs, g++ for compiling C++ programs, and related options for specifying compilation flags and output files.
Understand how to install LKM modules
Installing Loadable Kernel Modules (LKM) involves compiling module source code, loading modules into the Linux kernel, and managing module dependencies.
Understand Linux hardening methods
Hardening methods include configuring firewalls, implementing access controls, disabling unnecessary services, applying security patches, and using tools like SELinux and AppArmor.
Evading IDS, Honeypots, & Firewalls
List the types of intrusion detection systems
Types include network-based IDS (NIDS), host-based IDS (HIDS), anomaly-based IDS, and signature-based IDS.
Evasion techniques
Techniques include encryption, obfuscation, packet fragmentation, traffic manipulation, and exploiting vulnerabilities in IDS/IPS systems.
List firewall and honeypot evasion techniques
Evasion techniques include tunneling over DNS, IP spoofing, port scanning evasion, session splicing, and exploiting protocol weaknesses.
Buffer Overflows
Overview of stack-based buffer overflows
A stack-based buffer overflow occurs when a program writes data beyond the allocated buffer, potentially overwriting adjacent memory addresses.
Identify the different types of buffer overflows
Types include stack-based buffer overflows, heap-based buffer overflows, and format string vulnerabilities.
Methods of detection
Detection methods include code review, fuzzing, static analysis tools, and runtime protection mechanisms like stack canaries and non-executable stacks.
Overview of buffer overflow mutation
Buffer overflow mutation involves altering the behavior of overflow exploits through techniques like NOP sleds, shellcode encoding, and return-to-libc attacks.
Cryptography
Overview of cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties.
Encryption techniques
Techniques include symmetric encryption (e.g., AES), asymmetric encryption (e.g., RSA), and hashing algorithms (e.g., SHA-256).
Describe how public and private keys are used
Public keys are used for encryption and shared publicly, while private keys are used for decryption and kept secret by the owner.
Overview of MD5, SHA, RC4, RC5, Blowfish algorithms
MD5 and SHA are hashing algorithms; RC4 and RC5 are symmetric encryption algorithms; Blowfish is a symmetric block cipher algorithm.
Penetration Testing Methodologies
Overview of penetration testing methodologies
Methodologies include reconnaissance, scanning, exploitation, post-exploitation, and reporting.
List the penetration testing steps
Steps involve planning, information gathering, vulnerability assessment, exploitation, reporting, and mitigation.
Overview of the pen-test legal framework
Legal framework includes permissions, scope definition, consent, non-disclosure agreements, and compliance with laws and regulations.
Overview of the pen-test deliverables
Deliverables include a detailed report outlining vulnerabilities discovered, exploitation techniques used, and recommendations for mitigation.
List the automated penetration testing tools
Tools include Nessus, OpenVAS, Metasploit, Nikto, Burp Suite, and OWASP ZAP.
Cloud Computing
What is Cloud Computing in ethical hacking?
Cloud computing involves using remote servers hosted on the internet to store, manage, and process data, presenting unique security challenges.
Types of cloud computing
Types include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Methodologies in ethical hacking
Methodologies involve assessing cloud security posture, testing for misconfigurations, and evaluating data protection measures.
Role of Ethical Hackers in Cloud Computing
Ethical hackers assess cloud security, identify vulnerabilities, and recommend improvements to enhance data protection and compliance.
Covering Tracks
What is covering tracks?
Covering tracks involves hiding evidence of unauthorized access or actions taken during a security breach to evade detection.
Deleting logs
Deleting logs removes records of activities, preventing forensic analysis and investigation.
Modifying log files
Modifying log files alters recorded events or timestamps to mislead investigators.
Hiding malware or backdoors
Hiding malware or backdoors involves concealing malicious software or unauthorized access points to maintain persistent access without detection.
Gain a comprehensive understanding of modern ethical hacking tools, methods, and practices to effectively identify and mitigate security vulnerabilities.
Engage in practical exercises that replicate real-world cyber attacks, allowing you to develop hands-on skills in detecting and defending against security threats.
Learn key elements of network security, including intrusion detection systems, prevention strategies, and firewall configuration for robust protection.
Receive guidance from experienced cybersecurity professionals who bring real-world insights and up-to-date knowledge to every session.
Get ready for the Certified Hacking Defender exam with dedicated study resources, mock exams, and expert tips to ensure you’re fully prepared.
Boost your credentials and unlock new roles in the fast-growing cybersecurity field by earning a recognized certification in ethical hacking.
In today’s fast-paced digital world, the demand for skilled software professionals is higher than ever. Whether you’re a student aiming…
Expert in Oracle PL SQL Training Course By Elevate Academy Team DB Management Course World Class Instructor 1:1 with Industry…
Master in Oracle DBA Training Crash Course By Elevate Academy Team DB Management Course World Class Instructor 1:1 with Industry…
Core MSSQL Training Crash Course By Elevate Academy Team DB Management Course World Class Instructor 1:1 with Industry Expert 400+…
Refer your friends or colleagues to Elevate and earn gift vouchers worth up to ₹1000 for each successful enrollment.
Help others upskill while you enjoy exclusive rewards—it’s a win-win!