Project Description

Ethical Hacking sometimes called as Penetration Testing is an act of intruding/penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages.  The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. Ethical hackers may use the same methods and tools used by the malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems from attacks by malicious users.

Ethical hackers are expected to report all the vulnerabilities and weakness found during the process to the management.

Apply Today
  • Cyber Ethics-Hacking Introduction
  • Information Gathering
  • Scanning
  • Google Hacking Database
  • Virus, Worms – Virus Analysis
  • Trojans & Backdoors
  • Sniffers & keyloggers
  • Social Engineering
  • Email, DNS, IP spoofing
  • HoneyPots
  • System Hacking & Security

Website Hacking & Security

  • Vulnerability Research
  • SQL Injection 1
  • SQL Injection 2
  • XSS Attacks & Countermeasures
  • LFI/ RFI Attacks & Countermeasures
  • Information Disclosure Vulnerabilities
  • Buffer Overflow & Session Hijacking Attacks
  • Vulnerability Assessment & Penetration Testing
  • Exploit Writing
  • Secure Coding Practices

Mobile & Wireless Security

  • Wireless Hacking & Security
  • SMS Forging & Countermeasures
  • VoIP Hacking & Countermeasures
Apply Today
  • Students
  • IT Students & Professionals
  • Web Developers
  • Network Engineers
  • System Administrators
  • Law Professionals
  • Banking & finance Sector Professionals.

Apply Today

Join Over 500,000 Students Enjoying Black Terminal Now

Become Part of Black Terminal to Further Your Career.