Program Description
This boot camp will expose learners to standard hacking techniques & practices. We deliver hands-on-experience and train students on how to identify, counteract and prevent cyber-attacks. Upon completion of our course, learners will become Certified Ethical Hackers with the right skills and knowledge to secure organizations and prevent external & internal attacks. Note: We will cater to beginners and experts looking to sharpen their skills. This boot camp also guarantee you to pass the EC-Council Certified Ethical Hacker (CEH) exam.

 

Target Audience

 

IT professionals and anyone looking to become A Certified Ethical Hacker. Group & Corporate Discounts available.

 

Date & Venue

▪Sundays 9/23/2019 – 11/10/2019

Time (2 options):

▪Morning Camp: 2:00 PM – 9:00 PM

▪Venue: Miles Hall –  8401 Good Luck Rd, Lanham, MD 20706-2800, United States

Course Curriculum

PHASE 2 - CHAPTER 7 ETHICAL HACKING
Chapter 7.1 Introduction to Ethical Hacking 00:05:00
7.1 Questions Unlimited
Chapter 7.2 Active Passive Recon and Scanning 00:05:00
7.2 Questions Unlimited
Chapter 7.3 Introduction to Netcraft Archive PIPL and HTTRACK 00:06:00
7.3 Lab Unlimited
Chapter 7.4 Introduction to Maltego 00:06:00
7.4 Lab Unlimited
Chapter 7.5 Introduction to NAT 00:06:00
7.5 Questions Unlimited
Chapter 7.6 Metagoofil and Email Tracker 00:06:00
7.6 Lab Unlimited
chapter 7.7 Nmap Basic Scan (Review) 00:05:00
7.7 Lab Unlimited
Chapter 7.8 Nmap Scripting Engine 00:05:00
7.8 Lab Unlimited
Chapter 7.9 Introduction to Malware 00:04:00
7.9 Questions Unlimited
Chapter 7.10 How to Create a Computer Virus 00:06:00
7.10 Lab Unlimited
PHASE 2 - CHAPTER 8 METASPLOIT, VELT AND SHELLTER
Chapter 8.1 Intro to Metasploit, veil and Shellter 00:05:00
8.1 Questions Unlimited
Chapter 8.2 Backdoor Preparation OS Update and Veil Install 00:05:00
Chapter 8.3 Reverse TCP Exploit (backdoor) Using Veil and Mestasploit 00:06:00
8.3 Lab Unlimited
Chapter 8.4 Reverse TCP (Backdoor) exploit with AV off 00:04:00
8.4 Lab Unlimited
Chapter 8.5 Backdoor exploit with AV turned on 00:06:00
8.5 Lab Unlimited
Chapter 8.6 Meterpreter command examples after gaining access 00:06:00
8.6 Lab Unlimited
Chapter 8.7 Introduction to wireless technology 00:05:00
8.7 Questions Unlimited
Chapter 8.8 Hacking a Hidden SSID 00:06:00
8.8 Lab Unlimited
PHASE 2 - CHAPTER 9 PERSISTENCE CONNECTION AND DHCP
Chapter 9.1 Intro to Persistence Connection and DHCP 00:05:00
9.1 Questions Unlimited
Chapter 9.2 Persistence Connection part 1 00:04:00
9.2 Lab Unlimited
Chapter 9.3 Hacking Pep Talk and explanations 00:06:00
9.3 Lab Unlimited
Chapter 9.4 Persistence Connection using MOF 00:06:00
9.4 Lab Unlimited
Chapter 9.5 Intro to Cracking Wireless Security Protocols (WEP, WPA, WPA2) 00:05:00
9.5 Questions Unlimited
Chapter 9.6 Cracking Wireless (WPA2) Passwords 00:04:00
9.6 Lab Unlimited
PHASE 2 - CHAPTER 10 COVERING TRACKS
Chapter 10.1 Introduction to Covering Tracks 00:06:00
10.1 Questions Unlimited
Chapter 10.2 Clearing event logs 00:06:00
10.2 Lab Unlimited
Chapter 10.3 Combining your payload with Jpeg 00:05:00
10.3 Lab Unlimited
Chapter 10.4 Combining your payload with Excel 00:06:00
10.4 Lab Unlimited
Chapter 10.5 Phishing Wifi Password with Wifiphisher 00:06:00
10.5 Lab Unlimited

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

About Us

A comprehensive online course unlike any out there in the industry. We teach you information security from the ground up. Our training program takes you from learning theories and concept to real world scenarios that you can visualize and apply. In addition to the on-demand learning, you also have the option to receive one on one mentorship online. Our mentors will help you gain experience by engaging with real-world projects.

X