iQEH - ISEH Qualified Ethical Hacker

The Ethical Hacker!

Imagine being a digital detective, prowling through the vast expanse of cyberspace, seeking out vulnerabilities and weaknesses in computer systems not to exploit them, but to fortify them against malicious attackers. This, in essence, is what an ethical hacker does.

 

More formerly, an ethical hacker, also known as a white-hat hacker, is a cybersecurity professional who specializes in penetrating computer systems, networks, and applications with the permission of the owner. Unlike malicious hackers, who exploit vulnerabilities for personal gain or malicious intent, ethical hackers use their skills for constructive purposes, such as identifying security weaknesses and helping organizations strengthen their defenses.

 

Think of them as the guardians of the digital realm, tasked with uncovering potential threats before they can be exploited by cybercriminals. Their arsenal includes a deep understanding of computer systems, networks, and programming languages, coupled with an insatiable curiosity and a keen eye for detail.

 

Ethical hackers employ a variety of techniques to assess the security posture of a target, including penetration testing, vulnerability assessments, and code reviews. They simulate real-world cyber-attacks to identify weaknesses that could be exploited by adversaries, providing valuable insights to organizations on how to better protect their assets.

 

In the ever-evolving landscape of cybersecurity, ethical hackers play a critical role in staying one step ahead of cyber threats. By thinking like the adversary, they help organizations anticipate and mitigate potential risks, ultimately safeguarding sensitive data and preserving the integrity of digital infrastructure.

 

For aspiring cybersecurity professionals, pursuing a course in ethical hacking offers an opportunity to delve into this fascinating field, gaining hands-on experience and practical skills under the guidance of seasoned experts. It's not just about learning how to hack; it's about using that knowledge for the greater good, defending against cyber threats and safeguarding the digital world for generations to come.

Course Detail:

Course Title:  iQEH - ISEH Qualified Ethical Hacker

Duration:  12 Weeks.

Registration:  Open Now.

Class Timings:  Between 6PM to 9:30PM on Monday, Wednesday  and Friday.

Venue:  ISEH Main Campus (9 Noon Avenue, Block C, Muslim Town, Lahore).

Mode of Education/Training:  On Campus physical classes.

Registration Fee (Non Refundable): Rs. 500/- (Pak Rupees Five Hundred Only).

Course Fee:  Rs. 100,000.00 (Pak Rupees One Hundred Thousand Only). Deserving candidates can pay in instalments.

Discounts: Discount is available on group attendees and certain categories.


Note: Both registration and admission forms will be physically submitted at main campus of ISEH.   

Who Can Join:

What You Will Learn:

After having qualified this course, you will attain professional entry level proficiency in following subjects:

a. Client Engagement. Establishing the rules, scope, objectives, and reporting methodologies for engagements through drafting engagement agreement to formalize the terms of their red teaming activities.

b. Target Profiling and Planning. Delve into information gathering techniques, such as reconnaissance, both passive and active methods by learning tools like Nmap for port scanning and learn about enumeration techniques to gather information about networks and systems.

c. Exploitation (Attack). Understanding the purpose and planning of attacks. Also, learn about attacking web applications, including methods like Cross-Site Scripting (XSS) and Remote Control Execution (RCE) with file uploads. How to explore hacking databases through SQL injection and exploiting vulnerabilities in web servers.

d. Post Exploitation. Actions to be taken after gaining initial access, such as escalating privileges, maintaining access, pivoting to other systems, and persistence techniques to ensure continued access utilizing tools like Mimikatz and Metasploit.

e. Reporting. How to create comprehensive reports for stakeholders including preparation of executive summaries outlining the engagement's objectives, scope, findings, and their impact. Also, how to compile technical reports detailing identified vulnerabilities, remediation steps, and proofs of concept (PoCs).

a. Time Management for Professionals. Understand the essence of time management, emphasizing prioritization, planning, analysis, and optimization techniques to enhance productivity and efficiency in professional settings.

b. Communication and Presentation Skills. Learn key principles and fundamentals of effective communication, along with tips for improving communication skills. It involves the importance of visuals, dressing appropriately, mastering presentation software, and delivering presentations with confidence.

c. Understanding Individual and Corporate Psychology. Understand the psychological aspects of individual and corporate behavior, providing insights into human behavior within organizational contexts.

d. Teamwork and Conflict Management. Learn about team composition, problem assessment, planning and task allocation techniques to foster effective teamwork and manage conflicts within teams.

e. The Art of CV Writing. Compares CVs and resumes, discusses considerations for crafting attractive CVs, outlines the contents of a good CV, and provides examples of good and bad CVs.

f. Job Interview Preparation, Tips and Tricks. How to minimizing interview stress, understanding the perspectives of employers and candidates, identifying question types, and receiving general interview tips. They also learn about common interview problems, mistakes to avoid, and dress code tips, with a focus on sealing the deal during interviews.

g. Introduction to Research. Understand the concept and types of research, research methodologies, the research onion model, and the process of writing research reports.

Course Syllabus:

Section 1: The Preliminary Knowledge

Module 1: Information Security (InfoSec), InfoSec Models and Policies

Module 2: InfoSec Standards 

Module 3: InfoSec Threats, Attacks and InfoSec Controls 

Module 4: The Web Ecosystem, Web Architecture, Web System Architectures, Web Technologies, and Inter-communication

Module 5: Pentesting, Hacking; Its Methodologies/Approaches and the Hackers

Module 6: Cybercrimes and Cyber Laws

Section 2: Preliminary Skills for Ethical Hacking

Module 7: Virtual Environment

Module 8: Hacking Distros

Module 9: Data Representation and Coding Schemes

Module 10: Programming and Scripting

Module 11: Command Line Scripting

Module 12: Computer Networking

Module 13: Cryptography and Steganography

Section 3: Red Teaming

Module 14: Client Engagement

Module 15: Target Profiling and Planning

Module 16: Exploitation (Attack) Phase



20. System Hacking

21. Demonstration (backdoor)

22. Demonstration (HashCat)

23. Assignment (Hash cracking)

24. Demonstration (Buffer overflow)

25. Assignment (Buffer overflow)

26. Demonstration (SET)

27. Network Hacking

28. Demonstration (Hydra)

29. Assignment (Hydra)

30. Demonstration (badly configured shares)

31. Demonstration (exploitation of Null sessions)

32. Assignment (exploitation of Null sessions)

33. Demonstration (ARP spoofing)

34. Demonstration (jmeter)

35. Demonstration (Metasploit)

36. Group Assignment (Metasploit)

37. Demonstration (Meterpreter)

38. Assignment (Meterpreter)

39. Hacking the Cloud Computing

40. Hacking IoTs

41. Mobile Phone Hacking

42. Demonstration (Metasploit)

Module 17: Post Exploitation Phase

Module 18: Reporting Phase


Module 19: Artificially Intelligent Information Security

Section 4: Personality Development

Module 20: Time Management for Professionals


Module 21: Communication and Presentation Skills

Module 22: Understanding Individual and Corporate Psychology as an Employee

Module 23: Teamwork and Conflict Management in  Work Place

Module 24: The Art of CV Writing

Module 25: Job Interview Preparation, Tips and Tricks

Section 5: Research Methodology

Module 26: Introduction to Research

Section 6: Complete Hacking Project for Each Student (CTF style)