Ethical hacking

Starting from the Ground level Security Essentials, this course will lead you through Cryptography, Computer Networks & Security, Application Security, Data & Endpoint Security, idAM (Identity & Access Management), Cloud Security, Cyber-Attacks and various security practices for businesses.

Course Prerequisite

To get into Ethical Hacking field, there are no standard education criteria, however, it will be great if you have completed your Bachelor’s or Master’s degree in computer science, information security, or even mathematics.

Ethical Hacking Career: Job Profiles

  • Information Security Analyst.
  • Security Analyst.
  • Certified Ethical Hacker (CEH)
  • Ethical Hacker.
  • Security Consultant, (Computing / Networking / Information Technology)
  • Information Security Manager.
  • Penetration Tester.

Ethical Hacking Syllabus

Module 01: Introduction to Ethical Hacking

Information Security Threats and Attack Vectors

  • Motives, Goals, and Objectives of Information Security Attacks
  • Information Security Threats

Hacking Concepts

  • Hacking vs. Ethical Hacking
  • Effects of Hacking on Business
  • Who Is Hacker?
  • types of hackers

Information Security Controls

Module 02: Foot-printing and Reconnaissance

  • What is Footprinting?
  • Why Footprinting?
  • Objectives of Footprinting
  • Footprinting Threats
  • Footprinting Methodology
  • Website Footprinting

Module 03: Scanning Networks

  • Overview of Network Scanning
  • Scanning Methodology
  • Check for Live Systems
  • Banner Grabbing
  • Scan for Vulnerability
  • Prepare Proxies
  • Scanning Pen Testing

Module 04: System Hacking

  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • Hacking Methodology (CHM)
  • System Hacking Steps
  • Cracking Passwords
  • How Hash Passwords Are Stored in Windows SAM?
  • Keylogger
  • Spyware
  • Child Monitoring Spyware
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

Module 05: Viruses,Worms Trojans,Backdoors(MALWARE)

  • Virus and Worms Concepts
  • Types of Viruses
  • Computer Worms
  • Malware Analysis
  • Countermeasures
    • Anti-virus Tools
  • Trojan Detection
  • Countermeasures
    • Trojan Countermeasures
    • Backdoor Countermeasures
    • Trojan Horse Construction Kit
  • Anti-Trojan Software

Module 06: Sniffers

  • Sniffing Concepts
  • MAC Attacks
  • ARP
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Countermeasures
  • Sniffing Pen Testing

Module 07: Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Social Engineering Pen Testing
    • Social Engineering Pen Testing: Using Emails
    • Social Engineering Pen Testing: Using Phone
    • Social Engineering Pen Testing: In Person
    • Social Engineering Pen Testing: Social Engineering Toolkit (SET)

    Module 10: Denial of Service

    • DoS/DDoS Concepts
    • DoS Attack Techniques
    • Botnet
    • DDoS Case Study
    • DoS Attack Tools
    • Countermeasures
    • DoS/DDoS Protection Tools
    • DoS/DDoS Protection Tools

    Module 08: Hacking Webservers

    • Webserver Concepts
    • Webserver Attacks
    • Attack Methodology
    • Countermeasures
    • Webserver Security Tools

    Module 09: Hacking Web Applications

    • Web App Concepts
    • Web App Threats
    • Web App Hacking Methodology
      • Footprint Web Infrastructure
    • Web Application Hacking Tools
    • Countermeasures
    • Security Tools

    Module 10: SQL Injection

    • SQL Injection Concepts
    • Testing for SQL Injection
    • Types of SQL Injection
    • Blind SQL Injection
    • SQL Injection Methodology
    • Advanced SQL Injection
    • SQL Injection Tools
    • Evasion Techniques
    • Countermeasures

    Module 11: Hacking Wireless Networks

    • Wireless Concepts
    • Wireless Encryption
    • Wireless Threats
    • Wireless Hacking Methodology
      • Wi-Fi Discovery
      • Crack Wi-Fi Encryption
    • Wireless Hacking Tools
    • Countermeasures

    Module 12: Evading IDS, Firewalls, and Honeypots

    • IDS, Firewall and Honeypot Concepts
    • IDS, Firewall and Honeypot System
    • Evading IDS
    • Evading Firewalls
    • Detecting Honeypots
    • Firewall Evading Tools
    • Countermeasures
    • Penetration Testing

    Module 13: Cryptography

    • Cryptography Concepts
    • Encryption Algorithms
    • Cryptography Tools
    • Public Key Infrastructure(PKI)
    • Email Encryption
    • Disk Encryption
    • Cryptography Attacks
    • Cryptanalysis Tools

 

Ethical Hacking Training Center | Ethical Hacking Institute | Ethical Hacking Classes

    Contact us for Training & Certification

    Name

    Email

    Mobile Number

    Course


    Mode of Training


    By sending your details you agree to our terms and conditions*

     

    Open chat
    1
    Need Help ?
    Hello ,