So in this Course I will teach you 20 different modules step by step by screen shairing and voice over and its completely a practical knowledge sharing course. I am sure, it will clear all your doubts
Modules are -
Module2 Footprinting and reconnaissance
Module 3 Scanning networks
Module 4 Enumeration
Module 5 Vulnerability analysis
Module 6 Quick Overview
Module 6 system hacking Lab 1
Module 6 system hacking lab2,3,4
Module 7 Malware threats
Module 8 Sniffing
Module 9 Social engineering
Module 10 Denial of service
Module 11 Session hijacking
Module 12 Evading IDS:IPS firewalls
Module 13 Hacking Web servers
Module 14 hacking web application
Module 15 SQL injection
Module 16 Hacking wireless networks
Module 17 Hacking mobile platform
Module 18 IOT and OT Hacking
Module 19 cloud computing
Module 20 Cryptography
First Module Scenario -
Reconnaissance refers to collecting information about a target, which is the first step in any attack on a system. It has its roots in military operations, where the term refers to the mission of collecting information about an enemy. Reconnaissance helps attackers narrow down the scope of their efforts and aids in the selection of weapons of attack. Attackers use the gathered information to create a blueprint, or “footprint,” of the organization, which helps them select the most effective strategy to compromise the system and network security. Similarly, the security assessment of a system or network starts with the reconnaissance and footprinting of the target.
Ethical hackers and penetration (pen) testers must collect enough information about the target of the evaluation before initiating assessments. Ethical hackers and pen testers should simulate all the steps that an attacker usually follows to obtain a fair idea of the security posture of the target organization. In this scenario, you work as an ethical hacker with a large organization. Your organization is alarmed at the news stories concerning new attack vectors plaguing large organizations around the world. Furthermore, your organization was the target of a major security breach in the past where the personal data of several of its customers were exposed to social networking sites.
Lab Tasks
Ethical hackers or pen testers use numerous tools and techniques to collect information about the target.
Recommended labs that will assist you in learning various footprinting techniques include:
Perform footprinting through search engines
Gather information using advanced Google hacking techniques
Gather information from video search engines
Gather information from FTP search engines
Gather information from IoT search engines
Perform footprinting through web services
Find the company’s domains and sub-domains using Netcraft
Gather personal information using PeekYou online people search service
Gather an email list using theHarvester
Gather information using deep and dark web searching
Determine target OS through passive footprinting
Perform footprinting through social networking sites
Gather employees’ information from LinkedIn using theHarvester
Gather personal information from various social networking sites using Sherlock
Gather information using Followerwonk Perform website footprinting
Gather information about a target website using ping command line utility
Gather information about a target website using Website Informer
Extract a company’s data using
Web Data Extractor Mirror the target website using HTTrack
Web Site Copier Gather a wordlist from the target website using CeWL Perform email footprinting
many more lab and modules and its a fully practical and knowledge sharing course.