Ethical Hacking

Course Description

What is Ethical Hacking?
Ethical Hacking is an act of penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. Ethical hackers are expected to report all the vulnerabilities and weakness found during the process to the management.

How important is a course on ethical hacking?
In today's world, the IT industry is growing exponentially & so is the need for ethical hackers. Proper knowledge on ethical hacking can easily fetch you a job in any IT based company. It makes you eligible for posts like:
  • Information Security Analyst
  • Security Engineer
  • Penetration Tester
  • Security Analyst
  • Information Security Engineer
  • Information Security Manager
  • Security Consultant
Only people with the proper & practical knowledge of ethical hacking are eligible for these jobs. Several other jobs require a decent understanding of ethical hacking too.

About the course:
This course is a complete package to learn ethical hacking, starting from beginner to advance level. It is highly practical but sticks with theories too. This course is divided into sub-courses like: Hacking Basics, Web Security, Network Security, System Security etc. It covers ethical hacking on major platforms like Linux, Windows and Android. A certificate of this course from Coremacasia signifies your practical knowledge on ethical hacking and is enough to separate you from the rest.

Who can enroll?
Anyone with basic Computer skills is eligible to enroll.

Coremacasia ensures proper learning experience by providing you the best teachers with best teaching techniques. We believe only theories aren't good enough, so we provide practical experience with our live experiments & test sessions for ethical hacking. Get hands on experience by building projects & clear all your doubts on our doubt clearing sessions.

Course Instructor


Deepanjan Paul

A passout from UCL and specialises in Security in IOT



Introduction to Ethical Hacking

Learn basic concepts & aspects of Ethical Hacking

  • Introduction to Ethical Hacking & What you'll learn
  • Basic terminologies for hacking
  • Setting up required tools and software
  • Demonstrating a live hack as teaser of the course
  • Basics of Kali Linux
  • Legal perspectives of ethical hacking and proper disclosure


Social Engineering & Basic Tools

Learn about planning & executing a penetration test in details.

  • Learning about tools
  • Detailed Social Engineering Attacks - Planing, Execution & Prevention
  • Making and working of a key-logger
  • Phishing Overview
  • Introduction to metasploit
  • Next level phising with metasploit
  • Phishing with IDN Homograph
  • Phishing with URIs (Optional)


Detailed Website Hacking

Gain advanced web penetration skills & learn the prevention techniques

  • Introduction to Website Hacking
  • Types of website hacks
  • Detailed Information gathering (With and Without Tools)
  • Analyzing the information
  • Working with OWASP
  • Basics of SQL & PHP (Overview)
  • Basic HTML (optional - only for those who don't know)
  • In-depth XSS injection
  • Regular Expressions
  • In-depth SQL injection
  • Bypassing Checks
  • In-Depth File Upload & Inclusion Vulnerabilities
  • Taking File-Inclusion Vulnerabilities to Next Level
  • RFI vulnerabilities in-depth
  • In-Depth Cross Site Request Forgery Attacks
  • More types of attacks
  • Wrapping up Website hacking


Detailed Network Penetration

Become a master in major network hacking techniques & learn the prevention methods.

  • Introduction to Network Hacking
  • Using and working of TOR, Proxychains & VPN
  • Basics introduction of Network Hacking Tools and short revision of Network Basics
  • Footprinting Using NMAP
  • Metasploit & Meterpreter In-Depth
  • Writing own exploits with Metasploit (Overview)
  • Basics of Wi-Fi Hacking (WPA/WPA2)
  • Basics of network sniffing
  • Brute forcing for passwords
  • Using SSL Strips
  • Cloning APs
  • VoIP Attacks
  • Detailed DoS
  • DNS redirection hacking
  • MITM Attacks
  • Wrapping up with broader aspect of network hacking


Advanced Ethical Hacking & Extras

Learn in-depth device exploiting & shellcode strategies.

  • Introduction to Device exploiting
  • C Programming survival skills (Basics)
  • Basics of Computer memory
  • Assembly basics (Overview)
  • Introduction to basic Linux exploits
  • Advanced Linux exploits
  • Shellcode Strategies
  • Introduction to Windows Exploits
  • Understanding SEH
  • Understanding & Bypassing Windows Memory Protections
  • Hacking through back-doors
  • Understanding content type attacks
  • Source code analysis
  • Binary Analysis
  • Reverse Engineering
  • Wrapping up ethical hacking


Doubt Clearing Sessions & Project Building

Clear your doubts & get hands-on experience by building your own projects!