COURSE DETAILS Intrductin t Ethical Hacking What is Hacking Wh is a Hacker Skills f a Hacker Types f Hackers Reasns fr Hacking Wh are at the risk f Hacking attacks Effects f Cmputer Hacking n an rganizatin Netwrk Security Challenges Elements f Infrmatin Security The Security, Functinality & Usability Triangle What is Ethical Hacking Why Ethical Hacking is Necessary Scpe & Limitatins f Ethical Hacking What is Penetratin Testing What is Vulnerability Auditing FtPrinting What is FtPrinting Objectives f FtPrinting Finding a cmpany s details Finding a cmpany s dmain name Finding a cmpany s Internal URLs Finding a cmpany s Public and Restricted URLs Finding a cmpany s Server details Finding the details f dmain registratin Finding the range f IP Address
Finding the DNS infrmatin Finding the services running n the server Finding the lcatin f servers Tracerute analysis Tracking e-mail cmmunicatins Scanning What is netwrk scanning Objectives f netwrk scanning Finding the live hsts in a netwrk Finding pen prts n a server Finding the services n a server OS fingerprinting Server Banner grabbing tls What is a Vulnerability Scanning Vulnerability Scanner tls Finding mre details abut a vulnerability What is a prxy server Hw des prxy server wrk Types f prxy servers Hw t find prxy servers Why d hackers use prxy servers What is a TOR netwrk Why hackers prefer t use TOR netwrks Hacking Web Servers & Web Applicatins What is a web server Different webserver applicatins in use Why are webservers hacked & its cnsequences Directry traversal attacks Website defacement
Website passwrd brute frcing Hw t defend against web server hacking Sessin Hijacking What is sessin hijacking Dangers f sessin hijacking attacks Sessin hijacking techniques Crss-Site scripting attack Sessin hijacking tls Hw t defend against sessin hijacking SQL Injectin What is SQL Injectin Effects f SQL Injectin attacks Types f SQL Injectin attacks SQL Injectin detectin tls Evading Firewalls, IDS & Hneypts What is a Firewall What are the functins f a Firewall What is an IDS Hw des an IDS wrk SPAN IDS tls What is a hneypt Types f hneypts Hneypt tls Hneypt detectin tls Buffer Overflw What is a buffer Understanding usage f buffers in applicatins
What is buffer verflw Simple buffer verflw in C prgramming Hw t detect a buffer verflw Hw t defend against buffer verflw attacks Denial f Service What is a DS attack What is a DDS attack Symptms f a Ds attack DS attack techniques What is a Btnet Defending DS attacks Cryptgraphy What is Cryptgraphy Types f cryptgraphy Cipher algrithms Public key infrastructure What is a Hash Cryptgraphy attacks System Hacking What is system Hacking Gals f System Hacking Passwrd Cracking Passwrd cmplexity Finding the default passwrds f netwrk devices and sftwares Passwrd cracking methds Online passwrd cracking Man-in-the-middle attack Passwrd guessing
Offline passwrd cracking Brute frce cracking Dictinary based cracking Hybrid attack USB passwrd stealers Elcmsft Distributed passwrd recvery tls Active passwrd changer What is a keylgger Hw t deply a keylgger t a remte pc Hw t defend against a keylgger Sniffers What is a sniffer Hw sniffer wrks Types f sniffing Active sniffing Passive Sniffing What is prmiscuus mde Hw t put a PC int prmiscuus mde What is ARP ARP pisn attack Threats f ARP pisn attack Hw MAC spfing wrks MAC Flding What is a CAM Table Hw t defend against MAC Spfing attacks Hw t defend against Sniffers in netwrk Malware What is malware Types f malware
Virus What is a virus prgram What are the prperties f a virus prgram Hw des a cmputer get infected by virus Types f virus Virus making tls Hw t defend against virus attacks Wrm What is a wrm prgram Hw wrms are different frm virus Trjan What is a Trjan hrse Hw des a Trjan perate Types f Trjans Identifying Trjan infectins Hw t defend against Trjans Spyware What is a spyware Types f spywares Hw t defend against spyware Rtkits What is a Rtkit Types f Rtkits Hw des Rtkit perate Hw t defend against Rtkits Wireless Hacking Types f wireless netwrks Wi-Fi usage statistics Finding a Wi-Fi netwrk Types f Wi-Fi authenticatins
Using a centralized authenticatin server Using lcal authenticatin Types f Wi-Fi encryptin methds WEP WPA WPA2 Hw des WEP wrk Weakness f WEP encryptin Hw des WPA wrk Hw des WPA2 wrk Hardware and sftware required t crack Wi-Fi netwrks Hw t crack WEP encryptin Hw t crack WPA encryptin Hw t crack WPA2 encryptin Hw t defend against Wi-Fi cracking attacks Penetratin Testing What is Penetratin Testing Types f Penetratin Testing What is t be tested Testing the netwrk devices fr mis-cnfiguratin Testing the servers and hsting applicatins fr mis-cnfiguratin Testing the servers and hsting applicatins fr vulnerabilities Testing wireless netwrks Testing fr Denial f Service attacks Cunter Measure Techniques fr Netwrk level attacks Types f Firewall Packet Filtering Firewall Circuit-Level Gateway Firewall Applicatin-Level Firewall
Stateful Multilayer Inspectin Firewall Limitatins f a Firewall IDS / IPS What is an IDS What is a IPS Difference between IDS & IPS Placement f IDS in the Netwrk Cnfiguring an IDS in the Netwrk Placement f IPS in the Netwrk Cnfiguring an IPS in the Netwrk UTM / Next-Generatin Firewall What is a UTM Features f UTM Difference between a Firewall & a UTM Placement f UTM in the Netwrk Cnfiguring a UTM in the Netwrk Mnitring attacks using UTM Cnfiguring IPS mdule in UTM t detect and stp attacks Cunter Measure Techniques fr Lcal Systems Identifying the Vulnerabilities f a system Understanding the Vulnerabilities f a system CVE ID Bugtraq ID Patch Management Identifying the patch fr a Vulnerability Dwnlading the Patch Testing the patch fr stability in test envirnment Deplying the patch t Live Netwrk Finding the missing updates in an Operating System
Micrsft Baseline Security Analyzer Belarc Advisr Cunter Measure Techniques fr Malware Attacks Scanning systems fr Malware infectins Types f anti-malwares Anti-Virus Anti-Wrm Anti-Trjan Anti-Rtkit Internet Security Suites HIDS HIPS