Ethical Hacking

Reading Time: 2 minutes

Ethical Hacking

    ETHICAL HACKING – ADVANCED

      Module 1: Introduction to Ethical Hacking

      • What is Hacking?
      • What is Ethical Hacking?
      • What is the difference between both
      • What are the Learning Scope
      • 5 Phases of Ethical Hacking

      Module 2: FootPrinting (Reconnaissance-Passive)

      • Types of Footprinting
      • Footprinting Tools and Countermeasures

      Module 3: Enumeration (Reconnaissance – Active)

      • Enumeration Techniques
      • Enumeration Countermeasures

      Module 4: Network Scanning

      • Network Scanning Technique
      • Network Scanning Countermeasures <

      Module 5: System Hacking Methodology

      • System Hacking methodology
      • Steganography
      • Steganalysis Attacks
      • Covering Tracks

      Module 6: Virtual Machine

      • Installation of VM’s in Windows and MAC
      • Configuration of VM’s and Installing OS
      • Installing Software

      Module 7: Kali Linux

      • Installation of VM’s in Windows and MAC
      • Configuration of VM’s and Installing OS
      • Installing Software

      Module 8: Metasploit

      • Introduction to Metasploit
      • Working with Metasploit
      • Windows Hacking and Advanced Techniques

      Tools

        Module 9: N-map
        • Scanning using Nmap Tool
        • Advanced Commands and Techniques

        Module 10: Burp-Suit

        • Introduction
        • Installation
        • Configuring burp-suit with browsers
        • Working with burp-suit

        Module 11: Sniffing

        • What is Sniffing
        • Packet Sniffing Techniques
        • How to defend against Sniffing

        Module 12: Malware Threats

        • Types of Malwares
        • Types of Trojans
        • Trojan Analysis
        • Trojan Countermeasures

        Module 13: Virus and Worms

        • What is Virus and How it Works?
        • Virus Analysis
        • Computer Worms
        • Malwares
        • Analysis Procedure and Countermeasures

        Module 14: DoS and DDoS

        • What is Denial of Services (DoS)
        • What is Distributed Denial of Services (DDoS)
        • Types of Attacks
        • DoS/DDoS Attack Techniques
        • Botnets
        • DDoS Attack Tools
        • DoS/DDoS Countermeasures

        Module 15: Session Hijacking Techniques

        • Session Hijacking Techniques
        • Countermeasures

        Module 16: Servers Attacks – Web Server, File Servers

        • Different Types of Webserver Attacks
        • Attack Methodology and Countermeasures

        Module 17: Hacking Web Applications

        • Different Types of Web Application Attacks
        • Web Application
        • Hacking Methodology and Countermeasures

        Module 18: SQL Injection Attacks

        • SQL Injection Attacks
        • Injection Detection Tools

        Module 19: Wireless Networks Attacks

        • Wireless Encryption
        • Wireless Cracking Methodology
        • Wireless Cracking Tools
        • Wireless Security Tools

        Module 20: IDS, IPS, Firewalls and Honeypots

        • Firewall
        • Intrusion Detection System (IDS)
        • Honeypot Evasion Techniques
        • Evasion Tools
        • Countermeasures

        Module 21: Cloud Computing Techniques

        • Various Cloud Computing Concepts
        • Cloud Computing Threats
        • Cloud Computing Attacks
        • Security Techniques and Tools

        Module 22: Cryptography

        • Different Types of Cryptography Ciphers
        • Public Key Infrastructure (PKI)
        • Cryptography Attacks
        • Cryptanalysis Tools

        Module 23: Social Engineering

        • What is Social Engineering
        • Phishing Emails
        • Types of Social Engineering Attacks
        • Advanced Techniques
        • Countermeasures