
Join Best Ethical hacking course in Delhi
Recon is the Best Summer Training Institute for B.Tech / M.TECH / BE / B.SC / M.SC / MCA / BCA / CS / CSE / IT / Information Technology / Engineering Students. Summer Training in Delhi Offer by Recon for all engineering domains. Join Recon for Top Summer Training Institute for BE / B.Tech / B.SC / CSE /IT / Information Technology/ BCA / MCA / M.SC / B.Tech / M.Tech / Engineering Students. Recon is one of Delhi's best and well-known Summer Training Institute with high-tech infrastructure.
Live Project Project development is an important part of the curriculum during summer training programs for students. Learn step by step and Recon (Best Summer Training Institute for CS Student / CSE Student / IT Student / Computer Science / B.Tech / BA Student / M.Tech Student/ BCA Student / MCA Students / B.SC Students / M.SC Students) In addition to training, it also ensures that students work on project development to learn the practical aspects of their subject area. In this way, students have the opportunity to apply what they have learned. It helps to build and develop a solid foundation. In addition to these, there will be personality development and interview preparation sessions to prepare them for the job interview. Summer training projects should be considered as an important factor to confirm and evaluate the technical aspects of the candidate in the interview.
Ethical Hacking Summer Internship Training Syllabus
- πΆ Introduction to Ethical Hacking
- πΆ Kali Linux Hands on Training
- πΆ Reconnnaissance
- β’ Active Foot-Printing
- β’ Passive Foot-Printing
- β’ Finger Printing Active/Passive
- πΆ Scanning Networks
- β’ Host Discovery
- β’ TCP/UDP Port Scanning
- β’ Vulnerability Scanning
- πΆ Enumeration
- πΆ System Hacking
- β’ Physical Access (Windows / Linux OS)
- πΆ Malware & Threats
- β’ Virus / Worms
- β’ Trojan Horse
- β’ Ransomware
- β’ Polymorphic Virus
- β’ Macro Virus
- β’ Micro Virus
- β’ Rootkit, etc.
- πΆ Social Engineering
- β’ Phishing Attacks
- β’ Vishing Attack, etc.
- πΆ Denial of Service
- β’ DOS (Deial of Service)
- β’ DDOS (Distributed Denial of Service)
- πΆ Session Hijacking
- πΆ Wireless Hacking
- β’ WEP / WPA / WPA2 Wi-Fi Hacking
- πΆ Mobile Hacking
- πΆ Hacking Web-Application (with BurpSuite)
- πΆ SQL Injection
- β’ Automatic tool based
- β’ Manual SQL Injection
- πΆ Hacking Web Server
- πΆ Sniffing / Sniffers
- β’ MITM Attack
- β’ DNS Attack
- β’ DHCP Attack
- β’ MAC Address Attack, etc.
- πΆ IDS, Firewall, Honeypot
- πΆ Cryptography
- πΆ Basics of Cloud Computing / Hacking
- πΆ IoT Hacking
- πΆ Basics of Penetration Testing
- π’ Online / Offline Training
- π’ Live Practical training
- π’ 80% Practical Training
- π’ 20% Theory Training
- π’ Certificate after completion
- π’ Interview Questions
- π’ Test After completion
VA/PT Summer Internship Training Syllabus
- πΆ How to plan your Penetration Testing
- πΆ Scoping your Penetration Testing
- πΆ Network & Web-Application
- πΆ Scanning Vulnerability
- β’ Port Scanning
- β’ Script scanning
- β’ Enumeration
- β’ Service & Version Scanning
- β’ Web-Application Scanning
- πΆ Exploitation with Metasploit
- β’ Exploit Vulnerability
- β’ Bind & Reverse Shell
- β’ Payload Creation, etc.
- πΆ Post-Exploitation
- πΆ Pivoting Attack
- πΆ Browser exploitation
- β’ BEEF Exploit
- πΆ Denial of Service
- β’ DOS (Deial of Service)
- β’ DDOS (Distributed Denial of Service)
- πΆ In-Depth Password Attacks
- β’ John the Ripper
- β’ Brute Force Attack
- β’ Dictionary Attack
- β’ Rainbow Table Attack
- β’ Other Password Cracking Tools
- πΆ Crcking / Solving CTF's
- πΆ Final Analysis
- πΆ Final Report Generation
- β’ Manual Reporting
- β’ Automatic Reporting
- π’ Online / Offline Training
- π’ Live Practical training
- π’ 80% Practical Training
- π’ 20% Theory Training
- π’ Certificate after completion
- π’ Interview Questions
- π’ Test After completion
- πΆ Introduction to Web-application Penetration-Testing
- πΆ Finding Subdomains
- πΆ Understanding HTTP
- πΆ Access Control Flaws
- πΆ Ajax Security
- πΆ Authentication Flaws
- πΆ Buffer overflaws
- πΆ Code Quality
- πΆ Concurrency Flaws
- πΆ Cross Site Scripting
- πΆ Improper Error Handling
- πΆ Injection Flaws
- πΆ Denail of Service
- πΆ Insecure Communication
- πΆ Insecure Configuration
- πΆ Insecure Storage
- πΆ Malicious File Execution
- πΆ Parameter Tampering
- πΆ Session Management Flaws
- πΆ Challenge Online Platform
- π’ Online / Offline Training
- π’ Live Practical training
- π’ Interview Questions
- π’ Test After completion
- πΆ Android Fundamentals
- πΆ Improper Platform usage
- πΆ Insecure Data Storage
- πΆ Insecure Communication
- πΆ Insecure Authentication
- πΆ Insecure Authorization
- πΆ Client Code quality
- πΆ Trojan & Backdoor
- πΆ Code Tampering
- πΆ Reverse Engineering
- πΆ Live Application Testing
- πΆ Testing with Burp Suite
- πΆ Testing Application on Genymotion
- π’ Online / Offline Training
- π’ Live Practical training
- π’ Interview Questions
- π’ Test After completion
Our Free Services
Blogs and News
You can read about the latest updates and tools for Cyber Security.
Learning Videos and Tutorials
You can read and watch the free videos about cyber security.