ethical_hacking

GOVT. CERTIFIED PROGRAM

  • Introduction to Ethical Hacking

  • Key issues plaguing the information security world, incident management process, and penetration testing
  • Footprinting and Reconnaissance

  • Various types of footprinting, footprinting tools, and countermeasures
  • Scanning Networks

  • Network scanning techniques and scanning countermeasures
  • Enumeration

  • Enumeration techniques and enumeration countermeasures
  • System Hacking

  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Trojans and Backdoors

  • Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Viruses and Worms

  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Sniffing

  • Packet sniffing techniques and how to defend against sniffing
  • Social Engineering

  • Social Engineering techniques, identify theft, and social engineering countermeasures
  • Denial of Service

  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session Hijacking

  • Session hijacking techniques and countermeasures
  • Hacking Webservers

  • Different types of webserver attacks, attack methodology, and countermeasures
  • Hacking Web Applications

  • Different types of web application attacks, web application hacking methodology, and countermeasures
  • SQL Injection

  • SQL injection attacks and injection detection tools
  • Hacking Wireless Networks

  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
  • Hacking Mobile Platforms

  • Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
  • Evading IDS, Firewalls and Honeypots

  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Buffer Overflows

  • Various types of buffer overflows, how to mutate a buffer overflow exploit, buffer overflow detection tools, and countermeasures
  • Cryptography

  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • Penetration Testing

  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap