Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts)



Similar documents
RMAR Technologies Pvt. Ltd.

CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Vulnerability Assessment and Penetration Testing

CYBERTRON NETWORK SOLUTIONS

Certified Ethical Hacker (CEH)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Ethical Hacking Course Layout

Penetration Testing with Kali Linux

CEH Version8 Course Outline

Audience. Pre-Requisites

Course Title: Course Description: Course Key Objective: Fee & Duration:

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Certified Cyber Security Expert V Web Application Development

Learn Ethical Hacking, Become a Pentester

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access


June 2014 WMLUG Meeting Kali Linux

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

SONDRA SCHNEIDER JOHN NUNES

FSP-201: Ethical Hacking & IT Security

Detailed Description about course module wise:

Creation of Pentesting Labs

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

[CEH]: Ethical Hacking and Countermeasures

Build Your Own Security Lab

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Attack Frameworks and Tools

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

by Penetration Testing

EC Council Certified Ethical Hacker V8

Penetration Testing Walkthrough

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

Ethical Hacking & Cyber Security Workshop

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

CERTIFIED PENETRATION TESTING CONSULTANT

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy

VMware: Advanced Security

Kerem Kocaer 2010/04/14

Demystifying Penetration Testing

Enumerating and Breaking VoIP

CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks

Application Security Testing

Certified Penetration Testing Specialist

How to hack a website with Metasploit

IDS and Penetration Testing Lab ISA656 (Attacker)

EC-Council Certified Security Analyst (ECSA)

Ethical Hacking v7 40 H.

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Penetration Testing Report Client: Business Solutions June 15 th 2015

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

2016 TÜBİTAK BİLGEM Cyber Security Institute

INFORMATION SECURITY TRAINING CATALOG (2016)

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Hosts HARDENING WINDOWS NETWORKS TRAINING

McAfee Certified Assessment Specialist Network

Certified Penetration Testing Engineer

Automation of Post-Exploitation

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Maintaining Access CHAPTER 10 CHAPTER OVERVIEW AND KEY LEARNING POINTS INTRODUCTION INFORMATION IN THIS CHAPTER

ASK PC Certified Information Systems Security Expert - CISSE

ETHICAL HACKING. By REAL TIME FACULTY

Quick Start Guide to Ethical Hacking

Information Security. Training

INFORMATION SECURITY TRAINING CATALOG (2015)

AUTHOR CONTACT DETAILS

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Virtual Learning Tools in Cyber Security Education

Certified Penetration Testing Specialist

PowerShell for Penetration Testers

Lab 10: Security Testing Linux Server

Vinny Hoxha Vinny Hoxha 12/08/2009

Network Penetration Testing

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

IDS and Penetration Testing Lab ISA 674

Workshop Designed & Powered by TCIL IT, Chandigarh

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Ethical Hacking Penetrating Web 2.0 Security

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Open Source Toolkit. Penetration Tester's. Jeremy Faircloth. Third Edition. Fryer, Neil. Technical Editor SYNGRESS. Syngrcss is an imprint of Elsevier

Social Engineering Toolkit

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Transcription:

Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts) Course Module: 1. Introduction to Ethical Hacking 2. Footprinting a. SAM Spade b. Nslookup c. Nmap d. Traceroute 3. Scanning a. Port Scanning b. Banner Grabbing 4. Enumeration a. Attacking Null Sessions i. DumpSec ii. Winfo iii. Sid2User iv. NBTenun b. Enumerating Windows Active Directory Via LDAP TCP/UDP 5. System Hacking a. Using Live Operating Systems E-Mail: info@rmar.in Contact: +91-9807212292 8004516937

i. Back Track ii. OPHCrack iii. Trinity Rescue Kit iv. Offline Password Cracker v. Konboot vi. Countermeasures 6. Trojans & Backdoors & Countermeasures 7. Network Sniffing Attack a. Dsniff b. Ettercap c. SSLStrip d. Cain & Abel e. Wireshark (For Packet Analysis) f. Countermeasures 8. Penetration Testing a. The Phases of the PTES b. Types of Penetration Tests i. Overt Penetration Testing ii. Covert Penetration Testing 9. Metasploit a. Terminology b. Metasploit Interfaces i. MSFConsole ii. MSFCli iii. MSFGui E-Mail: info@rmar.in Contact: +91-9807212292 8004516937

iv. Armitage c. Metasploit Utilities i. MSFpayload ii. MSFencode iii. Nasm Shell d. Metasploit Express & Metasploit Pro e. Intelligence Gathering i. Passive Information Gathering ii. Active Information Gathering iii. Targeted Scanning f. Vulnerability Scanning i. Scanning with NeXpose ii. Scanning with Nessus g. Begin with Exploits i. Exploiting your First Machine ii. Exploiting an Ubuntu Machine h. Meterpreter i. Exploiting Windows XP Machine ii. Dumping Usernames & Passwords 1. Pass the Hash 2. Privilege Escalation 3. Token Impersonation 4. Using ps 5. Pivoting onto other Systems i. Using Meterpreter Scripts E-Mail: info@rmar.in Contact: +91-9807212292 8004516937

i. Migrating a Process ii. Killing Antivirus Software iii. Obtaining System Password Hashes iv. Viewing All traffic on a Target Machine v. Scraping a System vi. Using Persistence j. Avoiding Detection i. Creating Stand-Alone Binaries with MSFpayload k. Evading Antivirus Detection i. Encoding with MSFencode ii. Multi-encoding l. Custom Executable Template m. Launching a Payload Stealthily n. Exploiting Using-Client Side Attacks i. Browser Based Exploits ii. Exploring Internet Explorer Aurora Exploit iii. File Format Exploits iv. Sending the Payload o. Metasploit Auxiliary Modules i. Auxiliary Modules in Use ii. Anatomy of an Auxiliary Module p. The Social-Engineer Toolkit i. Configuring the Social Engineer Toolkit ii. Spear-Phishing Vector q. Using Stdapi E-Mail: info@rmar.in Contact: +91-9807212292 8004516937

r. Meterpreter Extensions Stdapi & Priv s. Metasploit Database Integration & Automation Exploits t. Backdoors & Rootkits u. Countermeasures 10. Snort - IDS/IPS Implementation 11. Wireless Hacking a. Understanding different IEEE Standards of Wireless a. WEP Cracking b. WPA-Psk Cracking c. WPA2-Psk Cracking d. Enterprise Wifi Cracking e. Caffe Latte Attack f. Countermeasures 12. Website Penetration Testing a. SQL Injection Attack i. Using manual query based SQL Injection ii. Using Havij iii. Using SQLMap (Back Track) b. Cross Site Scripting (XSS) Attack i. Persistent XSS ii. Non-Persistent XSS iii. Reflected XSS iv. Post XSS v. LFI & RFI vi. Bypassing Filters E-Mail: info@rmar.in Contact: +91-9807212292 8004516937

c. Shell Attack i. Gaining Server Access ii. Rooting Linux Server & getting meterpreter session on windows server iii. Mass Website Attack iv. Botnets v. Denial of Service (DoS) Attack vi. Distributed Denial of Service (DDoS) Attack vii. E-mail Spoofing viii. E-mail Bombing ix. Mass Mailing d. Countermeasures e. OWASP 13. Linux Hacking & Countermeasures 14. Router Hacking & Countermeasures 15. Reverse Engineering 16. IT Laws & legal working layout of Ethical Hacker LAB TEST E-Mail: info@rmar.in Contact: +91-9807212292 8004516937