COURSE DETAILS. Introduction to Ethical Hacking. FootPrinting. What is Hacking. Who is a Hacker. Skills of a Hacker.



Similar documents
Junos Pulse Instructions for Windows and Mac OS X

CEH Version8 Course Outline

Server 2008 R2 - Generic - Case

Certified Ethical Hacker Exam Version Comparison. Version Comparison

CallRex 4.2 Installation Guide

CSC 421 COURSE COMPACT

CNS-205: Citrix NetScaler 11 Essentials and Networking

CYBERTRON NETWORK SOLUTIONS

Configuring, Managing and Maintaining Windows Server 2008 Servers MOC-6419

Serv-U Distributed Architecture Guide

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Ethical Hacking Course Layout

EC-Council. Ethical Hacking and Countermeasures (version 8) (Exam )

Securely Managing Cryptographic Keys used within a Cloud Environment

[CEH]: Ethical Hacking and Countermeasures

Session 9 : Information Security and Risk

Cloud Services Frequently Asked Questions FAQ

Cisco IT Essentials v4.1. Course Overview. Total Hours: 240

Certified Ethical Hacker version 8

WEB APPLICATION SECURITY TESTING

CenterPoint Accounting for Agriculture Network (Domain) Installation Instructions

Deployment Overview (Installation):

CXA-300-1I: Advanced Administration for Citrix XenApp 5.0 for Windows Server 2008

Serv-U Distributed Architecture Guide

Detailed Description about course module wise:

EC Council Certified Ethical Hacker V8

Certified Ethical Hacker

Citrix XenApp 6.5 Basic Administration

MaaS360 Cloud Extender

IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH)

ISAM TO SQL MIGRATION IN SYSPRO

Ten Steps for an Easy Install of the eg Enterprise Suite

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

ABELMed Platform Setup Conventions

Microsoft Certified Database Administrator (MCDBA)

Ethical Hacking & Countermeasure Specialist. Course Title: Ethical Hacking & Countermeasure Specialist: Web Applications and Data Servers

SaaS Listing CA Cloud Service Management

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

CNS-205 Citrix NetScaler 10.5 Essentials and Networking

CareLink Connectivity Options Introduction and Comparison Updated June 2013

MANAGED VULNERABILITY SCANNING

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

Pronestor Room & Catering

Implementing CiscoWorks LMS

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

Planning, Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Environment for an MCSE on Windows 2000 Course No.

Understand Business Continuity

Ethical Hacking & Countermeasure Specialist. Course Title: Ethical Hacking & Countermeasure Specialist: Linux, Macintosh and Mobile Systems

INFORMATION SECURITY TRAINING

2. When logging is used, which severity level indicates that a device is unusable?

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

Datasheet. PV4E Management Software Features

PBX Remote Line Extension using Mediatrix 4104 and 1204 June 22, 2011

Setup PPD IT How-to Guides June 2010

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

FSP-201: Ethical Hacking & IT Security

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.

Why is a strong password important?

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

Configuring and Integrating LDAP

Help Desk Level Competencies

webnetwork Pre-Installation Configuration Checklist

HIPAA HITECH ACT Compliance, Review and Training Services

Learn More Cloud Extender Requirements Cheat Sheet

Remote Setup and Configuration of the Outlook Program Information Technology Group

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

CXA Citrix XenApp 6.5 Basic Administration

Customers FAQs for Webroot SecureAnywhere Identity Shield

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Security Guidance ArcGIS Server 9.3 Windows Security Requirements

Mac-Lab/CardioLab Anti-Virus Information Software version 6.9.6

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

UBC Incident Response Plan V1.5

City of Dublin Education & Training Board. Programme Module for. Network Security. leading to. Level 6 QQI. Network Security 6N0720

Comtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

State of Wisconsin. File Server Service Service Offering Definition

Transcription:

COURSE DETAILS Intrductin t Ethical Hacking What is Hacking Wh is a Hacker Skills f a Hacker Types f Hackers Reasns fr Hacking Wh are at the risk f Hacking attacks Effects f Cmputer Hacking n an rganizatin Netwrk Security Challenges Elements f Infrmatin Security The Security, Functinality & Usability Triangle What is Ethical Hacking Why Ethical Hacking is Necessary Scpe & Limitatins f Ethical Hacking What is Penetratin Testing What is Vulnerability Auditing FtPrinting What is FtPrinting Objectives f FtPrinting Finding a cmpany s details Finding a cmpany s dmain name Finding a cmpany s Internal URLs Finding a cmpany s Public and Restricted URLs Finding a cmpany s Server details Finding the details f dmain registratin Finding the range f IP Address

Finding the DNS infrmatin Finding the services running n the server Finding the lcatin f servers Tracerute analysis Tracking e-mail cmmunicatins Scanning What is netwrk scanning Objectives f netwrk scanning Finding the live hsts in a netwrk Finding pen prts n a server Finding the services n a server OS fingerprinting Server Banner grabbing tls What is a Vulnerability Scanning Vulnerability Scanner tls Finding mre details abut a vulnerability What is a prxy server Hw des prxy server wrk Types f prxy servers Hw t find prxy servers Why d hackers use prxy servers What is a TOR netwrk Why hackers prefer t use TOR netwrks Hacking Web Servers & Web Applicatins What is a web server Different webserver applicatins in use Why are webservers hacked & its cnsequences Directry traversal attacks Website defacement

Website passwrd brute frcing Hw t defend against web server hacking Sessin Hijacking What is sessin hijacking Dangers f sessin hijacking attacks Sessin hijacking techniques Crss-Site scripting attack Sessin hijacking tls Hw t defend against sessin hijacking SQL Injectin What is SQL Injectin Effects f SQL Injectin attacks Types f SQL Injectin attacks SQL Injectin detectin tls Evading Firewalls, IDS & Hneypts What is a Firewall What are the functins f a Firewall What is an IDS Hw des an IDS wrk SPAN IDS tls What is a hneypt Types f hneypts Hneypt tls Hneypt detectin tls Buffer Overflw What is a buffer Understanding usage f buffers in applicatins

What is buffer verflw Simple buffer verflw in C prgramming Hw t detect a buffer verflw Hw t defend against buffer verflw attacks Denial f Service What is a DS attack What is a DDS attack Symptms f a Ds attack DS attack techniques What is a Btnet Defending DS attacks Cryptgraphy What is Cryptgraphy Types f cryptgraphy Cipher algrithms Public key infrastructure What is a Hash Cryptgraphy attacks System Hacking What is system Hacking Gals f System Hacking Passwrd Cracking Passwrd cmplexity Finding the default passwrds f netwrk devices and sftwares Passwrd cracking methds Online passwrd cracking Man-in-the-middle attack Passwrd guessing

Offline passwrd cracking Brute frce cracking Dictinary based cracking Hybrid attack USB passwrd stealers Elcmsft Distributed passwrd recvery tls Active passwrd changer What is a keylgger Hw t deply a keylgger t a remte pc Hw t defend against a keylgger Sniffers What is a sniffer Hw sniffer wrks Types f sniffing Active sniffing Passive Sniffing What is prmiscuus mde Hw t put a PC int prmiscuus mde What is ARP ARP pisn attack Threats f ARP pisn attack Hw MAC spfing wrks MAC Flding What is a CAM Table Hw t defend against MAC Spfing attacks Hw t defend against Sniffers in netwrk Malware What is malware Types f malware

Virus What is a virus prgram What are the prperties f a virus prgram Hw des a cmputer get infected by virus Types f virus Virus making tls Hw t defend against virus attacks Wrm What is a wrm prgram Hw wrms are different frm virus Trjan What is a Trjan hrse Hw des a Trjan perate Types f Trjans Identifying Trjan infectins Hw t defend against Trjans Spyware What is a spyware Types f spywares Hw t defend against spyware Rtkits What is a Rtkit Types f Rtkits Hw des Rtkit perate Hw t defend against Rtkits Wireless Hacking Types f wireless netwrks Wi-Fi usage statistics Finding a Wi-Fi netwrk Types f Wi-Fi authenticatins

Using a centralized authenticatin server Using lcal authenticatin Types f Wi-Fi encryptin methds WEP WPA WPA2 Hw des WEP wrk Weakness f WEP encryptin Hw des WPA wrk Hw des WPA2 wrk Hardware and sftware required t crack Wi-Fi netwrks Hw t crack WEP encryptin Hw t crack WPA encryptin Hw t crack WPA2 encryptin Hw t defend against Wi-Fi cracking attacks Penetratin Testing What is Penetratin Testing Types f Penetratin Testing What is t be tested Testing the netwrk devices fr mis-cnfiguratin Testing the servers and hsting applicatins fr mis-cnfiguratin Testing the servers and hsting applicatins fr vulnerabilities Testing wireless netwrks Testing fr Denial f Service attacks Cunter Measure Techniques fr Netwrk level attacks Types f Firewall Packet Filtering Firewall Circuit-Level Gateway Firewall Applicatin-Level Firewall

Stateful Multilayer Inspectin Firewall Limitatins f a Firewall IDS / IPS What is an IDS What is a IPS Difference between IDS & IPS Placement f IDS in the Netwrk Cnfiguring an IDS in the Netwrk Placement f IPS in the Netwrk Cnfiguring an IPS in the Netwrk UTM / Next-Generatin Firewall What is a UTM Features f UTM Difference between a Firewall & a UTM Placement f UTM in the Netwrk Cnfiguring a UTM in the Netwrk Mnitring attacks using UTM Cnfiguring IPS mdule in UTM t detect and stp attacks Cunter Measure Techniques fr Lcal Systems Identifying the Vulnerabilities f a system Understanding the Vulnerabilities f a system CVE ID Bugtraq ID Patch Management Identifying the patch fr a Vulnerability Dwnlading the Patch Testing the patch fr stability in test envirnment Deplying the patch t Live Netwrk Finding the missing updates in an Operating System

Micrsft Baseline Security Analyzer Belarc Advisr Cunter Measure Techniques fr Malware Attacks Scanning systems fr Malware infectins Types f anti-malwares Anti-Virus Anti-Wrm Anti-Trjan Anti-Rtkit Internet Security Suites HIDS HIPS