Topics to be covered:
Module 01: Introduction to Ethical Hacking
- Introduction to Ethical Hacking
- What is hacking?
- incident management process
- penetration testing
- information security
Module 02: Footprinting and Reconnaissance
- What are Footprinting and Reconnaissance?
- Various types of footprinting
- footprinting tools
- footprinting countermeasures
Module 03: Scanning Networks
- Network scanning techniques
- scanning countermeasures
Module 04: Enumeration
- Enumeration techniques
- enumeration countermeasures
Module 05: Vulnerability Analysis
- Vulnerability Analysis using different tools
Module 06: System Hacking
- System hacking methodology
- steganography
- steganalysis attacks
- covering tracks
Module 07: Malware Threats
- Different types of Trojans
- Trojan analysis
- Trojan Countermeasures.
- Working of viruses.
- virus analysis
- computer worms
- malware analysis
Module 08: Sniffing
- Packet sniffing techniques
- how to defend against sniffing
Module 09: Social Engineering
- Social Engineering techniques
- Identify theft
- social engineering countermeasures
Module 10: Denial-of-Service
- DoS/DDoS attack techniques
- Botnets
- DDoS attack tools
- and DoS/DDoS countermeasures
Module 11: Session Hijacking
- Session hijacking techniques
- Session hijacking countermeasures
Module 12: Hacking Webservers
- Different types of web server attacks
- attack methodology
- Hacking Web Server Countermeasures
Module 13: Hacking Web Applications
- Different types of web application attacks
- web application hacking methodology
- web application countermeasure
Module 14: Hacking Wireless Networks
- Wireless Encryption
- wireless hacking methodology
- wireless hacking tools
- wi-fi security tools
Module 15: Hacking Mobile Platforms
- Mobile platform attack vector
- android vulnerabilities
- jailbreaking iOS
- windows phone 8 vulnerabilities
- mobile security guidelines
Module 16: Evading IDS, Firewalls and Honeypots
- Firewall
- IDS and honeypot evasion techniques
- evasion tools
- Countermeasures
Module 17: SQL Injection
- SQL injection attacks
- injection detection tools
Module 18: IoT Hacking
- What attacks are for IOT
- secure IoT Devices
Module 19: Cloud Computing
- cloud computing concepts
- attacks, and security techniques
Module 20: Cryptography
- Different types of cryptography ciphers
- Public Key Infrastructure
- cryptography attacks
- cryptanalysis tools