BANGALORE, India -
Jan. 20, 2025 -
PRLog -- What
InfosecTrain, a premier cybersecurity training organization, is set to host a free masterclass titled "Ethical Hacking Masterclass:
Your Guide to CEH," designed to provide participants with a comprehensive understanding of ethical hacking principles and techniques. This interactive, three-day event will offer in-depth insights into key topics aligned with the Certified Ethical Hacker (CEH) curriculum.
When
3-5 Feb 2025 (Mon-Wed)
8:00 PM to 10:00 PM (IST)
Why Attend
Unlock the secrets of ethical hacking in the Ethical Hacking Masterclass:
Your Guide to CEH! Over three power-packed days, dive into core concepts like cybersecurity essentials, penetration testing, and AI-driven ethical hacking. Explore hands-on techniques such as reconnaissance, footprinting, and social engineering, while unraveling the complexities of web application and API exploitation. Gain insights into industry-standard frameworks like OWASP Top 10 and practical strategies to combat evolving threats. With expert-led sessions and live Q&A, this masterclass is your chance to master in-demand skills and accelerate your cybersecurity career. Don't miss the opportunity to stay ahead in the dynamic world of ethical hacking!
Participants will earn a CPE certificate, get direct insights and guidance from industry experts, and gain latest knowledge and practical strategies to help them navigate and advance in the cybersecurity field.
Agenda
DAY 1
Introduction to Ethical Hacking
- What is Security?
- Need for Security?
- Cybersecurity vs Information Security
- Understanding Pillars of Security
- Types of Threat Actors
- Security Teams
Overview of Penetration Testing process
- What is Penetration Testing?
- Strategies of Penetration Testing
- What can be tested? – Web, Mobile, Network, API, etc.
- Phases of ethical hacking
- Cyber Kill Chain
- Why AI-Driven Ethical Hacking?
DAY 2
Introduction to Reconnaissance
- What is Footprinting?
- Types of Footprinting
- Information obtained in Footprinting
- Footprinting through search engines
Overview of Network Scanning
- Discovering live hosts
- Finding open ports
- Banner grabbing
Social Engineering
- What is Social Engineering?
- Types of Social Engineering
- Phishing – Practical
DAY 3
Introduction to Web Application Exploitation
- What is Application?
- Introduction to Web Application
- Website vs Web Application
- How Web Application works?
- HTTP Protocol
- HTTP Request and Response
- OWASP TOP 10
- Injection – SQL injection and XSS injection
- Cross Site Request Forgery (CSRF)
- Introduction to API
- OWASP TOP 10 API
Registration Link
https://www.infosectrain.com/events/ethical-hacking-maste...Course Link
https://www.infosectrain.com/courses/certified-ethical-ha...About InfosecTrain
To know more about training programs offered by InfosecTrain:
Please write back to sales@infosectrain.com or call at IND: 1800-843-7890 (Toll-Free) / US: +1 657-221-1127 / UAE: +971 569-908-131