- Home
- Industrial Training
- ethical_hacking
ethical_hacking
GOVT. CERTIFIED PROGRAM
Introduction to Ethical Hacking
- Key issues plaguing the information security world, incident management process, and penetration testing
Footprinting and Reconnaissance
- Various types of footprinting, footprinting tools, and countermeasures
Scanning Networks
- Network scanning techniques and scanning countermeasures
Enumeration
- Enumeration techniques and enumeration countermeasures
System Hacking
- System hacking methodology, steganography, steganalysis attacks, and covering tracks
Trojans and Backdoors
- Different types of Trojans, Trojan analysis, and Trojan countermeasures
Viruses and Worms
- Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
Sniffing
- Packet sniffing techniques and how to defend against sniffing
Social Engineering
- Social Engineering techniques, identify theft, and social engineering countermeasures
Denial of Service
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
Session Hijacking
- Session hijacking techniques and countermeasures
Hacking Webservers
- Different types of webserver attacks, attack methodology, and countermeasures
Hacking Web Applications
- Different types of web application attacks, web application hacking methodology, and countermeasures
SQL Injection
- SQL injection attacks and injection detection tools
Hacking Wireless Networks
- Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
Hacking Mobile Platforms
- Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
Evading IDS, Firewalls and Honeypots
- Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
Buffer Overflows
- Various types of buffer overflows, how to mutate a buffer overflow exploit, buffer overflow detection tools, and countermeasures
Cryptography
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
Penetration Testing
- Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap