Linux with CEH
(Online Live Training)

About

Join the certified courses from Prutor.AI, IIT Kanpur this Summer, and get the opportunity to utilize your summer vacation by learning new technology at the comfort of your home.

This online live training program is designed in such a way that it makes learning by building projects super easy for you.

Certificate You Will Get

For applying for a job Linux with CEH certificate is considered one of the most needed certifications.

Get in Touch

Training Highlights

Learn from home

Stay safe indoors

Certificate of Training

From Prutor.ai

Online Live Classes

Learn anywhere

Faculty Support

Throughout the training

2 months of training

Duration

Doubt clearing

During the live session

Syllabus

The comprehensive syllabus of Linux with CEH

Project Work

You can build

Beginner friendly

No prior knowledge required

New Batch Starting in

Join any time and start learning

Price: @Rs. 17,188 + 18% GST

Enroll Now

How will you get your certificate?

IIT Kanpur was the first institute in India to start a Computer Science Department.

IIT Kanpur has a rich base of alumni in this space who have made a remarkable impact around the world (Dr. Arvind Krishnan, CEO IBM, Dr. Rajeev Motwani, Google mentor, Dr. Narayan Murthy, Founder Infosys, Mr. Amit Agarwal, CTO Amazon to name few)

While education is impacted, some of the institutions continue to do well as they have realized the importance of practice. There is no substitution to practice. While other jobs are impacted due to COVID 19 coding jobs are still in demand.

To solve the problem of teaching introductory programming to Engineering students, Dr. Amey Karkare, Computer Science Department at IIT Kanpur has developed software - Prutor, that is being used at IIT Bombay, IIT Goa, IIT Kanpur, IISC Bangalore, IISER Bhopal, and EICT Academy IIT Kanpur to teach programming to more than 40,000+ students.

We believe in the practical and industry-based approach of teaching at Prutor.ai

Certificate

Why Learn Linux with CEH?

Learn from Experts at IIT Kanpur

Live Classes over Zoom

Cover the latest developments in mobile and web technologies

Learn advanced log management

Master advanced hacking concepts

How will your training work?

1

Attend Online Classes

2

Learn with Hands-on practical

3

Do the project work

4

Give the final quiz

5

Get a certificate in Linux with CEH

Linux with CEH (Mixed Language)

Online Live Training with Faculty Support

Key Features

  1. Lectures in  Mixed Language
  2. Slides in English
  3. Training: 6 weeks of learning
  4. Price: @Rs. 17,188 + 18% GST
Enroll Now

COURSE CURRICULUM - Month 1 (Linux)

  • Linux - An IntroductionIn this lesson, you will know what Linux is, how it came into existence, and whose contribution to its development?

    Along with this, you will also learn about Linux's different distributions and distros.

     

  • Installing Ubuntu LinuxIn this lesson, you will learn how to install Ubuntu Linux on your system?

     

  • Linux Installation with WindowsIn this lesson, you will learn to install Ubuntu in your windows system, as well as you will also learn about UNetbootin.

     

  • Essentials Command Line Interface (CLI) - LinuxIn this lesson, you will go to the command line and learn about commands such as "cd", "pwd" and "ls".

     

  • Administrator Privileges in TerminalIn this lesson, you will know what the administrative privileges are in the terminal and what do you use them with?

     

  • Installing applications using apt-get packagesIn this lesson, you will learn to install the application with the help of apt-get

     

  • Explaining Ownership and File PermissionsIn this lesson, you will know what is the ownership and file permissions in the command line and how do they change?

     

  • Using Touch Command to create new filesIn this lesson, you will learn how to create new files by using the touch command.

     

  • CLI Usage - AdvancedIn this lesson, you will learn about some advanced commands in the command line interface such as "mkdir", "mv", "cp" and "rm".

     

  • Finding commands and their practical useIn this lesson, you will learn about find command and some of its practical uses.

     

  • Finding information within files - The "grep" commandIn this lesson, you will learn how to find something inside the files by using grep command?

     

  • Using Terminal to view running processes and close applicationsIn this lesson, you will learn about the processes and you will also know what these are and how do they manage it?

     

  • Explaining ServicesIn this lesson, you will know about services and you will also learn how to use Elasticsearch?

  • Scheduling Tasks - The "crontab" commandIn this lesson, you will learn to schedule your tasks by using the "crontab" command in the command line interface.

     

  • Understanding IDE (Integrated Development Environment)In this lesson, you will learn about various types of Integrated Development Environment (IDE) in detail.

     

  • Installing GitHub and setting up the repositoryIn this lesson, you will learn how to install git hub and how to create a new repository?

     

  • Meteor.js - Getting StartedIn this lesson, you will learn how to install meteor.js in your system and how do you add bootstrap to your package?

     

  • Meteor - Setting up ProjectIn this lesson, you will learn how to set up the Meteor application in your project.

     

  • Setting up LAMP (Linux, Apache 2, MySQL, PHP)In this lesson, you will learn about Apache 2. Apart from this, you will also focus on PHP and MySQL.

     

  • Host files in LinuxIn this lesson, you will learn about the host files in the Linux system and you will also know what these are and how do they work?

     

  • Meteor - Deploying app on Apache ServerIn this lesson, you will learn how to deploy your meteor application in Apache 2 server?

     

  • phpMyAdmin - Installation and ConfigurationIn this lesson, you will learn about phpMyAdmin and you will also learn how to install and configure it?

     

  • Basic Virtual Host - How to create?In this lesson, you will learn about Basic Virtual Host and learn how to create it.

     

  • WordPress installation on top of Apache 2 environment - How to set up?In this lesson, you will learn to download WordPress and set up it in the Apache 2 environment.

     

  • Command Line Interface and Installing PythonIn this lesson, you will learn about python. Along with this, you will also know what is its basic installation and how its versions are checked?

     

  • Python - Worth learning?In this lesson, you will learn about modules and also try to understand why python is such an important language?

     

  • Understanding User Management in LinuxIn this lesson, you will learn to manage the user account through both the GUI (Graphical User Interface) and the CLI (Command Line Interface).

  • Using the terminal to delete usersIn this lesson, you will learn how to delete users using the terminal.

     

  • How to add users to a group?In this lesson, you are going to learn how to create a new group for users?

     

  • Networking - An IntroductionIn this lesson, you will know what is networking? How does this work? Apart from this, you will also discuss some of its basic fundamentals.

     

  • Understanding InternetIn this lesson, you will know what is the Internet and how does it work? Apart from this, you will learn about the IP address.

     

  • Looking at practical commands in networkingIn this lesson, you will learn some practical networking in the terminal. Along with this, you will learn about "ping" and "ifconfig" command.

     

  • Tracking detailed network statistics - The "Netstat" commandIn this lesson, you will learn how to track network statistics by using the "netstat" command.

     

  • Host files in Linux - RevisitingIn this lesson, you will learn about the Linux host file.

     

  • Tracking server requests - The "traceroute" commandIn this lesson, you will learn about the "traceroute" command. What is this and why it is used, you will talk about it too.

     

  • Tracking activity on a network - The Network MapperIn this lesson, you will learn how to do networking tasks in Linux? Apart from this, you will also learn to use Nmap tool.

     

  • Accessing the command line of a remote host - The "SSH" protocolIn this lesson, you will learn how to access the safe shell of a remote host by using the "SSH" protocol.

     

  • Transferring files between machines - The "SFTP" protocolIn this lesson, you will learn to transfer files between two machines, by using the "SFTP" protocol.

     

  • How to set up an SSH host on a local machine?In this lesson, you will learn how to set up an SSH host on your local machine.

     

  • Learning about programs - The "man" commandIn this lesson, you will talk about the "man" command which is a very good tool for getting information about any command.

COURSE CURRICULUM - Month 2 (CEH)

Module 01 - Introduction to Ethical Hacking

  • Lesson 01 - Information Security Overview
  • Lesson 02 - Information Security Threats and Attack Vectors
  • Lesson 03 - Hacking Concepts
  • Lesson 04 - Ethical Hacking Concepts
  • Lesson 05 - Information Security Controls
  • Lesson 06 - Penetration Testing Concepts
  • Lesson 07 - Information Security Laws and Standards

Module 02 - Footprinting and Reconnaissance

  • Lesson 01 - Footprinting Concepts
  • Lesson 02 - Footprinting through Search Engines
  • Lesson 03 - Footprinting through Web Services
  • Lesson 04 - Footprinting through Social Networking Sites
  • Lesson 05 - Website Footprinting
  • Lesson 06 - Email Footprinting
  • Lesson 07 - Competitive Intelligence
  • Lesson 08 - Whois Footprinting
  • Lesson 09 - DNS Footprinting
  • Lesson 10- Network Footprinting
  • Lesson 11- Footprinting through Social Engineering
  • Lesson 12 - Footprinting Tools
  • Lesson 13 - Countermeasures
  • Lesson 14 - Footprinting Pen Testing

Module 03 - Scanning Networks

  • Lesson 01 - Network Scanning Concepts
  • Lesson 02 - Scanning Tools
  • Lesson 03 - Scanning Techniques
  • Lesson 04 - Scanning Beyond IDS and Firewall
  • Lesson 05 - Banner Grabbing
  • Lesson 06 - Draw Network Diagrams
  • Lesson 07 - Scanning Pen Testing

Module 04 - Enumeration

  • Lesson 01 - Enumeration Concepts
  • Lesson 02 - NetBIOS Enumeration
  • Lesson 03 - SNMP Enumeration
  • Lesson 04 - LDAP Enumeration
  • Lesson 05 - NTP Enumeration
  • Lesson 06 - SMTP Enumeration and DNS Enumeration
  • Lesson 07 - Enumeration Countermeasures
  • Lesson 08 - Other Enumeration Techniques
  • Lesson 09 - Enumeration Pen Testing

Module 05 - Vulnerability Analysis

  • Lesson 01 - Vulnerability Assessment Concepts
  • Lesson 02 - Vulnerability Assessment Solutions
  • Lesson 03 - Vulnerability Scoring Systems
  • Lesson 04 - Vulnerability Assessment Tools
  • Lesson 05 - Vulnerability Assessment Reports

Module 06 - System Hacking

  • Lesson 01 - System Hacking Concepts
  • Lesson 02 - Cracking Passwords
  • Lesson 03 - Escalating Privileges
  • Lesson 04 - Executing Applications
  • Lesson 05 - Hiding Files
  • Lesson 06 - Covering Tracks
  • Lesson 07 - Penetration Testing

Module 07 - Malware Threats

  • Lesson 01 - Malware Concepts
  • Lesson 02 - Trojan Concepts
  • Lesson 03 - Virus and Worm Concepts
  • Lesson 04 - Malware Analysis
  • Lesson 05- Countermeasures
  • Lesson 06- Anti-Malware Software
  • Lesson 07- Malware Penetration Testing

Module 08 - Sniffing

  • Lesson 01- Sniffing Concepts
  • Lesson 02- Sniffing Technique: MAC Attacks
  • Lesson 03- Sniffing Technique: DHCP Attacks
  • Lesson 04- Sniffing Technique: ARP Poisoning
  • Lesson 05- Sniffing Technique: Spoofing Attacks
  • Lesson 06- Sniffing Technique: DNS Poisoning
  • Lesson 07- Sniffing Tools
  • Lesson 08- Countermeasures
  • Lesson 09- Sniffing Detection Techniques
  • Lesson 10- Sniffing Pen Testing

Module 09- Social Engineering

  • Lesson 01 - Social Engineering Concepts
  • Lesson 02 - Social Engineering Techniques
  • Lesson 03- Insider Threats
  • Lesson 04 - Impersonation on Social Networking Sites
  • Lesson 05 - Identity Theft
  • Lesson 06 - Countermeasures
  • Lesson 07 - Social Engineering Penetration Testing

Module 10- Denial-of-Service

  • Lesson 01 - DoS/DDoS Concepts
  • Lesson 02 - DoS/DDoS Attack Techniques
  • Lesson 03 - Botnets
  • Lesson 04 - DDoS Case Study
  • Lesson 05 - DoS/DDoS Attack Tools
  • Lesson 06 - Countermeasures
  • Lesson 07 - DoS/DDoS Protection Tools
  • Lesson 08 - DoS/DDoS Attack Penetration Testing

Module 11- Session Hijacking

  • Lesson 01- Session Hijacking Concepts
  • Lesson 02- Application Level Session Hijacking
  • Lesson 03- Network Level Session Hijacking
  • Lesson 04- Session Hijacking Tools
  • Lesson 05- Countermeasures
  • Lesson 06- Penetration Testing

Module 12 - Evading IDS, Firewalls, and Honeypots

  • Lesson 01- IDS, Firewall, and Honeypot Concepts
  • Lesson 02- IDS, Firewall, and Honeypot Solutions
  • Lesson 03- Evading IDS
  • Lesson 04- Evading Firewalls
  • Lesson 05- IDS/Firewall Evading Tools
  • Lesson 06- Detecting Honeypots
  • Lesson 07- IDS/Firewall Evasion Countermeasures
  • Lesson 08- Penetration Testing

Module 13- Hacking Web Servers

  • Lesson 01- Web Server Concepts
  • Lesson 02- Web Server Attacks
  • Lesson 03- Web Server Attack Methodology
  • Lesson 04- Web Server Attack Tools
  • Lesson 05- Countermeasures
  • Lesson 06- Patch Management
  • Lesson 07- Web Server Security Tools
  • Lesson 08- Web Server Pen Testing

Module 14- Hacking Web Applications

  • Lesson 01 - Web App Concepts
  • Lesson 02 - Web App Threats
  • Lesson 03 - Hacking Methodology
  • Lesson 04 - Web Application Hacking Tools
  • Lesson 05 - Countermeasures
  • Lesson 06 - Web App Security Testing Tools
  • Lesson 07 - Web App Pen Testing

Module 15- SQL Injection

  • Lesson 01 - SQL Injection Concepts
  • Lesson 02 - Types of SQL Injection
  • Lesson 03 - SQL Injection Methodology
  • Lesson 04 - SQL Injection Tools
  • Lesson 05 - Evasion Techniques
  • Lesson 06 - Countermeasures

Module 16- Hacking Wireless Networks

  • Lesson 01 - Wireless Concepts
  • Lesson 02 - Wireless Encryption
  • Lesson 03 - Wireless Threats
  • Lesson 04 - Wireless Hacking Methodology
  • Lesson 05 - Wireless Hacking Tools
  • Lesson 06 - Bluetooth Hacking
  • Lesson 07 - Countermeasures
  • Lesson 08 - Wireless Security Tools
  • Lesson 09 - Wi-Fi Pen Testing

Module 17- Hacking Mobile Platforms

  • Lesson 01- Mobile Platform Attack Vectors
  • Lesson 02- Hacking Android OS
  • Lesson 03- Hacking iOS
  • Lesson 04- Mobile Spyware
  • Lesson 05- Mobile Device Management
  • Lesson 06- Mobile Security Guidelines and Tools
  • Lesson 07- Mobile Pen Testing

Module 18- IoT Hacking

  • Lesson 01- IoT Concepts
  • Lesson 02- IoT Attacks
  • Lesson 03- IoT Hacking Methodology
  • Lesson 04- IoT Hacking Tools
  • Lesson 05- Countermeasures
  • Lesson 06- IoT Pen Testing

Module 19- Cloud Computing

  • Lesson 01 - Cloud Computing Concepts
  • Lesson 02 - Cloud Computing Threats
  • Lesson 03 - Cloud Computing Attacks
  • Lesson 04 - Cloud Security
  • Lesson 05 - Cloud Security Tools
  • Lesson 06 - Cloud Penetration Testing

Module 20- Cryptography

  • Lesson 01- Cryptography Concepts
  • Lesson 02- Encryption Algorithms
  • Lesson 03- Cryptography Tools
  • Lesson 04- Public Key Infrastructure (PKI)
  • Lesson 05- Email Encryption
  • Lesson 06- Disk Encryption
  • Lesson 07- Cryptanalysis
  • Lesson 08- Countermeasures

Price: @Rs. 17,188 + 18% GST

Enroll Now

How will your doubts get solved?

Ask your questions in live sessions and we will resolve them

Course Designed and Developed by

Prof Amey Karkare

Prof Amey Karkare

Faculty in Department of CSE, IIT Kanpur

View Profile

Rahul Garg

Rahul Garg

25+ year of IT Industry work experience in India & abroad

View Profile

Price: @Rs. 17,188 + 18% GST

Enroll Now