Ethical Hacking

Ethical Hacking

In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. Throughout the course, you will be immersed in a hacker’s mindset, evaluating not just logical, but physical security.

Course Objectives

After completing this course, students will be able to

  • Introduction to Ethical Hacking
  • Footprinting, Scanning, and Enumeration
  • Hacking Web servers and Web applications
  • DoS, SQL injection, Buffer overflow attacks
  • Cryptography
  • Wireless hacking
  • Linux Hacking
  • Phishing
  • Countermeasures

Target Audience

  • IT Professional
  • Network Professional
  • Network Admin
  • System Engineer

Course Pre-Requisites

  • An ethical hacker must have excellent computer networking and programming skills.
  • An ethical hacker must be cautious, vigilant, and diligent in seeking to search and wait for the required results.
  • An ethical hacker should always be wise enough to consider the scenario and certain users’ mindset, to utilize social engineering exploitations. A good ethical hacker still requires excellent problem-solving skills.
  • Ethical hackers do require street smarts, people’s talents, and also manipulation skills.
  • You need to keep up to date with new technologies, vulnerabilities, and exploitation techniques.

Course Duration

Introduction to Ethical Hacking

1
What is Hacking & Hacker
2
Types of Hackers
3
Reasons for Hacking
4
Who are at the risk of Hacking attacks
5
Effects of Computer Hacking on an organization
6
Network Security Challenges
7
Elements of Information Security
8
The Security, Functionality & Usability Triangle
9
What is Ethical Hacking
10
Why Ethical Hacking is Necessary
11
Scope & Limitations of Ethical Hacking
12
What is Penetration Testing
13
What is Vulnerability Auditing

Foot Printing

1
What is Foot Printing
2
Objectives of Foot Printing
3
Finding a company’s details
4
Finding a company’s domain name
5
Finding a company’s Internal URLs
6
Finding a company’s Public and Restricted URLs
7
Finding a company’s Server details
8
Finding the details of domain registration
9
Finding the range of IP Address
10
Finding the DNS information
11
Finding the services running on the server
12
Finding the location of servers
13
Traceroute analysis
14
Tracking e-mail communications

Scanning

1
What is network scanning & Objectives of network scanning
2
Finding the live hosts in a network
3
SMTP , SNMP & DNS Enumeration
4
Finding open ports on a server
5
OS fingerprinting
6
Server Banner grabbing tools
7
What is a Vulnerability Scanning
8
Vulnerability Scanner tools
9
Finding more details about a vulnerability
10
What is a proxy server
11
How does proxy server work
12
Types of proxy servers
13
How to find proxy servers
14
Why do hackers use proxy servers
15
What is a TOR network
16
Why hackers prefer to use TOR networks

Hacking Web Servers & Web Application

1
What is a web server
2
Different webserver applications in use
3
Why are webservers hacked & its consequences
4
Directory traversal attacks
5
Website defacement
6
Website password brute forcing
7
How to defend against web server hacking

Session Hijacking

1
What is session hijacking
2
Dangers of session hijacking attacks
3
Session hijacking techniques
4
Cross-Site scripting attack
5
Session hijacking tools
6
How to defend against session hijacking

SQL Injection

1
What is SQL Injection
2
Effects of SQL Injection attacks
3
Effects of SQL Injection attacks
4
SQL Injection detection tools

Evading Firewalls

IDS & Honeypots

1
What is a Firewall
2
What are the functions of a Firewall
3
What is an IDS
4
How does an IDS work
5
SPAN & IDS tools
6
What is a honeypot
7
Types of honeypots
8
Honeypot tools
9
Honeypot detection tools

Buffer OverFlow

1
What is a buffer
2
Understanding usage of buffers in applications
3
What is buffer overflow
4
Simple buffer overflow in C programming
5
How to detect a buffer overflow
6
How to defend against buffer overflow attacks

Denial of Service

1
What is a DoS attack
2
What is a DDoS attack
3
Symptoms of a Dos attack
4
DoS attack techniques
5
What is a Botnet
6
Defending DoS attacks

Cryptography

1
What is Cryptography
2
Types of cryptography
3
Cipher algorithms
4
Public key infrastructure
5
What is a Hash
6
Cryptography attacks

System Hacking

1
What is system Hacking
2
Goals of System Hacking
3
Password Cracking & Password complexity
4
Finding the default passwords of network devices and softwares
5
Password cracking methods
6
Online password cracking
7
Man-in-the-middle attack
8
Password guessing & Brute force cracking
9
Dictionary based cracking
10
USB password stealers
11
Hybrid attack
12
Elcomsoft Distributed password recovery tools
13
Active password changer
14
What is a keylogger
15
Deploy a keylogger to a remote pc & Defend against a keylogger

Sniffers

1
What is a sniffer
2
How sniffer works
3
Types of sniffing
4
What is promiscuous mode
5
How to put a PC into promiscuous mode
6
What is ARP & ARP poison attack
7
Threats of ARP poison attack
8
How MAC spoofing works
9
MAC Flooding
10
What is a CAM Table
11
How to defend against MAC Spoofing attacks
12
How to defend against Sniffers in network

Phishing

1
What is Phishing
2
How Phishing website is hosted
3
How victims are tricked to access Phishing websites
4
How to differentiate a Phishing webpage from the original webpage
5
How to defend against Phishing attacks

Malware

1
What is malware & Types of malware
2
Virus & What is a virus program
3
What are the properties of a virus program
4
How does a computer get infected by virus
5
Types of virus
6
Virus making tools
7
How to defend against virus attacks
8
What is a worm program
9
How worms are different from virus
10
Trojan
11
What is a Trojan horse
12
How does a Trojan operate
13
Types of Trojans
14
Spyware

Kali Linux

1
What is Kali Linux
2
How Kali Linux is different from other Linux distributions
3
What are the uses of Kali Linux
4
Tools for Footprinting, Scanning & Sniffing
5
What is Metasploit framework
6
Using Metasploit framework to attack Wiindows machines
7
Using Metasploit

Wireless Hacking

1
Types of wireless networks & Wi-Fi usage statistics
2
Finding a Wi-Fi network
3
Types of Wi-Fi authentications
4
Using a centralized authentication server
5
Using local authentication
6
Types of Wi-Fi encryption methods
7
How does WEP work & Weakness of WEP encryption
8
How does WPA work & WPA2 work
9
Hardware and software required to crack Wi-Fi networks
10
How to crack WEP encryption & WPA encryption
11
How to crack WPA2 encryption
12
How to defend against Wi-Fi cracking attacks

Penetration Testing

1
What is Penetration Testing
2
Types of Penetration Testing
3
What is to be tested
4
Testing the network devices for mis-configuration
5
Testing the servers and hosting applications for mis-configuration
6
Testing the servers and hosting applications for vulnerabilities
7
Testing wireless networks
8
Testing for Denial of Service attacks

Counter Measure Techniques for Network level attacks

1
Types of Firewall & Packet Filtering Firewall
2
Circuit-Level Gateway Firewall
3
Application-Level Firewall
4
Stateful Multilayer Inspection Firewall
5
Limitations of a Firewall
6
IDS / IPS Details
7
Difference between IDS & IPS
8
Placement of IDS in the Network
9
Configuring an IDS in the Network
10
Configuring an IDS in the Network
11
Placement of IPS in the Network
12
Configuring an IPS in the Network

Counter Measure Techniques for Local Systems

1
Identifying the Vulnerabilities of a system
2
Understanding the Vulnerabilities of a system
3
Patch Management
4
Identifying the patch for a Vulnerability
5
Downloading the Patch
6
Testing the patch for stability in test environment
7
Deploying the patch to Live Network
8
Finding the missing updates in an Operating System
9
Microsoft Baseline Security Analyzer
10
Belarc Advisor

Counter Measure Techniques for Malware attacks

1
Scanning systems for Malware infections
2
Types of anti-malwares
3
Anti-Virus
4
Anti-Worm
5
Anti-Trojan
6
Anti-Rootkit Internet Security Suites
7
Anti-Rootkit
8
HIDS & HIPS

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Lectures: 190
Video: 48 Hours

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed

Login Or Register