Ethical Hacking and Bug Bounty

Course Objective:

The main aim of Ethical Hacking – Practical Course is to assist IT experts to develop their skills and to understand how systems, networks and applications can be exploited through one of its existing vulnerabilities and how to think as an intruder or a hacker, to know the most effectiveness offensive methods and techniques. In this course we are considering hypothetical situations and case studies, performing test scenarios, at the end the IT experts can be better prepared to prevent and avoid security threats and know how to mitigate and deal with security incident after it has been occurred. Also, to better understand how to evaluate and analyze IT environment security posture.

Ethical Hacking – Practical Course will focus on the below points:

1. Practical vs. theoretical training.

2. Using case studies in training.

3. Using hypothetical situations in training.

4. Using tools and procedures in practice.

5. Discussing and simulating real life situations.

6. Improve observation skills.

7. Use ethical hacking skills to gain money.

=== Course Content ===

Chapter 1: Intro to Ethical Hacking and Bug Bounty

Chapter 2: Reconnaissance

- Reconnaissance methodology.

- Reconnaissance tools.

- Active and passive reconnaissance.

Chapter 3: Networks Scanning

- Scanning live hosts and identifying OS.

- Scanning open ports and identifying services.

- Perform MITM attack.

- Perform DNS spoofing attack.

- Perform Java Script injection.

- Perform DHCP snooping attack.

- Sniff information (username, passwords, email, etc).

Chapter 4: Vulnerability Scanning

- Using vulnerability scanner tools.

- Understanding CVEs.

- Identifying false-positives and false-negatives.

Chapter 5: System Hacking

- Gaining and maintaining access to systems, and clear logs.

- Perform server side attacks.

- Perform client side attacks.

Chapter 6: Malware Threats

- Malware creation.

- Malware threats.

- Combine backdoor with any file.

Chapter 7: Evading Firewall and IDS

- Bypassing windows firewall.

- Maintain persistence connection.

Chapter 8: Social Engineering

- Social engineering attacks.

- Types of social engineering.

Chapter 9: Denial of Service

- Botnets.

- DoS and DDoS tools.

Chapter 11: Hacking Web Servers

- Web server reconnaissance.

- Gaining unrestricted access.

Chapter 12: Session Hijacking

Chapter 13: Hacking Web Application

- Exploit file upload vulnerabilities.

- Cross Site Scripting (XSS) Attacks

- Command execution / injection attacks.

- Brute force attacks.

Chapter 14: SQL Injection

- SQL injection vulnerabilities.

- Reading and tampering database information.

- Find database tables.

- Extract sensitive information.

- Extracting data using SQLmap.

Chapter 15: Bug Bounty

- Bug bounty platforms.

- How to gain money.

Chapter 16: Hacking Wireless Networks

- WIFI packet sniffing.

- WIFI Cracking.

- WIFI De-Authentication attacks.

Chapter 17: Hacking Mobile Platform

=== Course Duration ===

  • 30 Hours (practical)

=== Training Registration ===

  • To register for this course, please fill the Registration Form or send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.