LightBlog
Contact at mumbai.academics@gmail.com or 8097636691/9323040215
Responsive Ads Here

Sunday, 27 May 2018

Ethical Hacking Training

Ethical Hacking

The Certified Ethical Hacker Course will teach the students about hacking from an entirely practical stand-point following the principle of Doing and Leering. With the complete Laboratory network access, After completing this course candidate will be performing all the steps from scanning the network to testing it critically and finally hacking it LIVE before suggesting the remedial actions. The practical approach gives the student an in-depth knowledge about the hacking tools and techniques. The simulated lab environment will demonstrate how actual hackers percolate through the multi-level defenses of the organization. Apart from the steps of hacking, this course teaches you additionally about the Buffer Overflows, Creating a Virus, DDoS attacks, Intrusion Detection techniques and Social Engineering among others.

Module 01: Introduction to Ethical Hacking 

  • Information Security Overview.
  • Information Security Threats and Attack Vectors. 
  • Hacking Concepts.
  • Hacking Phases .
  • Types of Attacks.
  • Information Security Controls.

Module 02: Footprinting and Reconnaissance

  • Footprinting Concepts.
  • Footprinting Threats. 
  • Footprinting Methodology.
  • Footprinting through Search Engines.
  • Website Footprinting.
  • Email Footprinting.
  • Competitive Intelligence.
  • Footprinting using Google.
  • WHOIS Footprinting.
  • DNS Footprinting.
  • Network Footprinting.
  • Footprinting through Social Engineering.
  • Footprinting through.
  • Footprinting Tools.

Module 03: Scanning Networks 

  • Overview of Network Scanning 
  • CEH Scanning Methodology 
  • Check for Live Systems 
  • Check for Open Ports 
  • Scanning Beyond IDS
  • Banner Grabbing
  • Scan for Vulnerability
  • Draw Network Diagrams
  • Prepare Proxies
  • Scanning Pen Testing

Module 04: Enumeration 

  • Enumeration Concepts.
  • NetBIOS Enumeration. 
  • SNMP Enumeration.
  • UNIX/Linux Enumeration.
  • LDAP Enumeration.
  • NTP Enumeration.
  • NTP Enumeration Commands.

Module 05: System Hacking 

  • Cracking Passwords.
  • CEH System Hacking Steps . 
  • Escalating Privileges.
  • Executing Applications.
  • Hiding Files.
  • Covering Tracks.

Module 06: Trojans and Backdoors 

  • Trojan Concepts
  • Trojan Infection 
  • Types of Trojans 
  • Trojan Detection
  • Anti-Trojan Software
  • Pen Testing for Trojans and Backdoors

Module 07: Viruses and Worms

  • Virus and Worms Concepts
  • Types of Viruses 
  • Computer Worms
  • Malware Analysis
  • Counter-measures
  • Penetration Testing for Virus

Module 08: Sniffers 

  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS poisoning
  • Sniffing Tools
  • Sniffing Pen Testing

Module 09: Social Engineering 

  • Social Engineering Concepts 
  • Types of Social Engineering
  • Types of Social Engineering
  • Identity Theft
  • Social Engineering Countermeasures
  • Social Engineering Pen Testing

Module 10: Denial of Service 

  • DoS/DDoS Concepts 
  • DoS Attack Techniques
  • Botnet 
  • DDoS Case Study
  • DoS Attack Tools
  • Counter-measures
  • DoS/DDoS Protection Tools 
  • Denial-of-Service (DoS) Attack Penetration Testing

Module 11: Session Hijacking 

  • Session Hijacking Concepts 
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter-measures
  • Session Hijacking Pen Testing

Module 12: Hacking Webservers 

  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter-measures 
  • Patch Management
  • Webserver Security Tools 
  • Webserver Pen Testing

Module 13: Hacking Web Applications 

  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Analyze Web Applications
  • Attack Authentication Mechanism
  • Authorization Attack Schemes 
  • Attack Session Management Mechanism 
  • Perform Injection Attacks
  • Web Application Hacking Tools
  • Countermeasures
  • Security Tools
  • Web App Pen Testing

Module 14: SQL Injection 

  • SQL Injection Concepts
  • Testing for SQL Injection
  • Types of SQL Injection 
  • Blind SQL Injection
  • SQL Injection Methodology
  • Advanced SQL Injection
  • SQL Injection Tools
  • Evasion Techniques
  • Counter-measures

Module 15: Hacking Wireless Networks 

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wi-Fi Discovery
  • GPS Mapping
  • Wireless Traffic Analysis 
  • Launch Wireless Attacks
  • Crack Wi-Fi Encryption
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Counter-measures
  • Wireless Security Tools 
  • Wi-Fi Pen Testing 

Module 16: Hacking Mobile Platforms 

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Android Device Tracking Tools 
  • Hacking iOS
  • Hacking Windows Phone OS
  • Guidelines for Securing Windows OS Devices
  • Hacking BlackBerry 
  • Blackberry Spyware: FinSpy Mobile
  • Guidelines for Securing BlackBerry Devices
  • Mobile Device Management (MDM) 
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

Module 17: Evading IDS, Firewalls, and Honeypots 

  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewalls
  • Detecting Honeypots
  • Firewall Evading Tools 
  • Countermeasures
  • Penetration Testing 

Module 18: Buffer Overflow 

  • Buffer Overflow Concepts 
  • Buffer Overflow Examples
  • Buffer Overflow Detection
  • Buffer Overflow Counter-measures
  • Buffer Overflow Security Tools 
  • Buffer Overflow Penetration Testing

Module 19: Cryptography 

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure(PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools

Module 20: Penetration Testing 

  • Pen Testing Concepts
  • Types of Pen Testing
  • Pen Testing Techniques
  • Pen Testing Phases
  • Pen Testing Roadmap
  • Outsourcing Pen Testing Services

No comments:

Post a Comment