Ethical Hacking Course Layout



Similar documents
Detailed Description about course module wise:

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

CYBERTRON NETWORK SOLUTIONS

Certified Ethical Hacker Exam Version Comparison. Version Comparison

CEH Version8 Course Outline

FSP-201: Ethical Hacking & IT Security

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

RMAR Technologies Pvt. Ltd.

Course Content: Session 1. Ethics & Hacking

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

SONDRA SCHNEIDER JOHN NUNES

Build Your Own Security Lab

If you know the enemy and know yourself, you need not fear the result of a hundred battles.


Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

[CEH]: Ethical Hacking and Countermeasures

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Course Title: Course Description: Course Key Objective: Fee & Duration:

Attack Frameworks and Tools

EC Council Certified Ethical Hacker V8

FORBIDDEN - Ethical Hacking Workshop Duration

Threat Events: Software Attacks (cont.)

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Vulnerability Assessment and Penetration Testing

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Certified Ethical Hacker (CEH)

ETHICAL HACKING. By REAL TIME FACULTY

Professional Penetration Testing Techniques and Vulnerability Assessment ...

SCP - Strategic Infrastructure Security

Loophole+ with Ethical Hacking and Penetration Testing

Network Attacks and Defenses

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Description: Objective: Attending students will learn:

Certified Cyber Security Expert V Web Application Development

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

INFORMATION SECURITY TRAINING

Certified Information Security Expert (CISE L1 V3) Detailed Course Module

Quick Start Guide to Ethical Hacking

ETHICAL HACKING CYBER SECURITY

Certified Penetration Testing Specialist

EC-Council. Certified Ethical Hacker. Program Brochure

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Section 12 MUST BE COMPLETED BY: 4/22

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Ethical Hacking & Cyber Security Workshop

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

EC-Council Ethical Hacking and Countermeasures

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

A Systems Engineering Approach to Developing Cyber Security Professionals

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

The Information Security Problem

McAfee Certified Assessment Specialist Network

Kerem Kocaer 2010/04/14

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Learn Ethical Hacking, Become a Pentester

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

VMware: Advanced Security

Cain & Abel v 2.5. Password Cracking Via ARP Cache Poisoning Attacks. v.1. Page 1 of 15

Ethical Hacking v7 40 H.

Workshop Designed & Powered by TCIL IT, Chandigarh

Audience. Pre-Requisites

Scene of the Cybercrime Second Edition. Michael Cross

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) /24

ASK PC Certified Information Systems Security Expert - CISSE

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Penetration Testing with Kali Linux

Creation of Pentesting Labs

Network Security Fundamentals

Assessing Network Security

Network Attacks. Common Network Attacks and Exploits

Client logo placeholder XXX REPORT. Page 1 of 37

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

form approved June/2006 revised Page 1 of 7

IDS and Penetration Testing Lab ISA656 (Attacker)

CS5008: Internet Computing

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

Network Security: Introduction

Web Applications The Hacker s New Target

Attacks from the Inside

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

CompTIA Security+ (Exam SY0-410)

Different Types of Adware and Services


GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

Transcription:

Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type of Ethical Hackers Hackers vs. Crackers o Classification of Hackers o Phases of Hacking o Basic Terminologies o Hacker Classes o Skills of Ethical Hacker o Vulnerability Research Networking and Basics o IP Address, Finding a Remote IP Address o Hiding Your IP Address o Tracing an IP Address o MAC Address o Internal VS External IP Addresses o MAC Addresses o MAC Addresses Spoofing Kali Linux o Introduction & Installation o Basic Linux Command o Installing Linux Application o Assigning IP Address in Kali o Changing the default password o Updating the applications and operating system o Virtual Box o VMware Workstation Google Hacking: Advisories and server vulnerabilities, finding Login Page, Using Cache and Google as Proxy,Hacking Live Webcam, Printer etc.

Foot printing o What is Foot printing? o Types of Foot printing o DNS brute forcing with fierce o Domain Information Groper o Ns Lookup it's there when you need it o Search for People o Search for Company s Information o Finding Internal URL of Website o Gather public information o DNS and WHOIS Lookups o Robots.txt o Network Reconnaissance o Archive Pages o Mirroring of Websites Scanning o Definition of Scanning o Types of Scanning o Difference between Port and Network Scanning o Ping and Ping Sweep o Network Scanning o Use of NMAP o Advanced Port Scanner o Port Scanning o Daemon Banner Grabbing o OS Fingerprinting o ID Server Tool o Vulnerability Scanning o Nessus Tool Attacking Phase : Exploit Vulnerability, Mestaploit -learn it and love it, Armitage, Net Cat, Learn Meter preter, Getting files to and from victim machines Android Phone Hacking: Introduction to Android, Gaining Access to Android Phone, APK File Package, Securing your Mobile

System Hacking o System Hacking Techniques o System Hacking Goal o Window Hacking & Security o Password Cracking o SysKey o Hiding Files o Ophcrack o Hiren Boot & Konboot o Concept of Auditing, Logs, Covering Tracks o What are Covering Tracks? o Techniques to clear Tracks o Covering Track Tools Sniffing o Network Sniffing o Active and passive Sniffing attacks o Session Hijacking Attacks o Tools : Hamster, Ferret, Urlsnarf o DNS Poisoning o Passive Sniffing & Active Sniffing o ARP Poisoning Attacks o Ettercap, Cain abel & Tcpdump o MAC Flooding Attacks o Tool : MACOF Trojan o Purpose of Trojan o Types of Trojan o Purpose of Trojan inventor o Detecting Trojan Attacks o Ports used by Trojans o Beast & Dark Comet o Wrapper o Icon Changer o Network Activity Detection o Process Monitoring Tools o Suspicious Files and Folders Detection

Virus & Worm o Working of Virus & Worm o Stages of Virus o Creating Virus by programming and automate tools o Virus Analysis o Difference between Worm & Virus o Virus Detection Method o Spyware o Internet and E-mail Spyware o Adware Wireless Hacking o Introduction of Wireless Network o Types of Wireless Network,Wireless Technology o Advantages and Disadvantages of Wireless Network o Wireless Cracking WEP,WPA,WPA2 o Wireless Security o Wireless Intrusion Detection System o Tips to Secure Wireless Network Email Hacking o Concept of Email Spam and Spam Laws o E-Mail Tracking By Header o Concept of Fake E-mails o Various Steps to send Fake mails Trace IP by PHP Script Phishing o Tabnapping o Desktop Phishing o Social Engineering Keylogger o What is Keylogger? o Categorization of Keystroke Loggers o Advanced Keylogger o Keylogger: Spytech SpyAgent o Keylogger: Perfect Keylogger o Hardware Keylogger

USB Hacking & Browser Hacking o USB Hacking USB for Coping Data o Blocking USB Devices o Browser Security o Manta Browser o Beef Stenography o Art of Hiding o How Steganography Works o Steganography Today o Steganography With CMD o Steganography Tools o Steganalysis Crypotography o Introduction to Cryptography o Advantages and uses of Cryptography o Symmetric Algorithms Asymmetric Algorithms o Encryption o Cipher o Disk Encryption o Hashing Algorithms DOS And DDOS o Concept: Denial of Service o Introduction to Distributed Denial of Service Attacks? o Working of Distributed Denial of Service Attacks? o Symptoms of a DOS Attack o Impact DDOS/DOS Attack Difference of DDOS & DOS o Intoduction to Botnet Social Engineering attacks Through SET - Set Social Engineering toolkit. SQL Injection Concepts o Basics of SQL o Web Application Working o Introduction to Server Side Technologies

o SQL injection o Identifying SQL Injection via Error Messages o Advanced SQL Injection Attacks o SQL Injection using Kali SQLMAP o Types of SQL Injection o Simple SQL Injection Attack o Union SQL Injection Example o SQL Injection Error Based Social Engineering o What is Social Engineering? o Techniques of Social Engineering o Attempt Using Phone, E-mail, Traditional Mail, In person, Dumpster Diving, Websites, Shoulder surfing, Third Person Approach. o Spam Emails o Social Engineering with Computer Firewalls & Honeypots o What Does a Firewall Do? o What a Firewall cannot do o How does a Firewall work? o Types of Firewall o Working of Firewall o Advantages and Disadvantages of Firewall o Test firewall using fire walking tool o Concept of Honeypots o Purpose and working of Honeypots o Advantages and Disadvantages of Honeypots o Types and uses of Honeypots Penetration Testing o Pen Testing Concepts o Types of Pen Testing o Pen Testing Phases & Tools