Starting from the Ground level Security Essentials, this course will lead you through Cryptography, Computer Networks & Security, Application Security, Data & Endpoint Security, idAM (Identity & Access Management), Cloud Security, Cyber-Attacks and various security practices for businesses.
Course Prerequisite
To get into Ethical Hacking field, there are no standard education criteria, however, it will be great if you have completed your Bachelor’s or Master’s degree in computer science, information security, or even mathematics.
Ethical Hacking Career: Job Profiles
- Information Security Analyst.
- Security Analyst.
- Certified Ethical Hacker (CEH)
- Ethical Hacker.
- Security Consultant, (Computing / Networking / Information Technology)
- Information Security Manager.
- Penetration Tester.
Ethical Hacking Syllabus
Module 01: Introduction to Ethical Hacking
Information Security Threats and Attack Vectors
- Motives, Goals, and Objectives of Information Security Attacks
- Information Security Threats
Hacking Concepts
- Hacking vs. Ethical Hacking
- Effects of Hacking on Business
- Who Is Hacker?
- types of hackers
Information Security Controls
Module 02: Foot-printing and Reconnaissance
- What is Footprinting?
- Why Footprinting?
- Objectives of Footprinting
- Footprinting Threats
- Footprinting Methodology
- Website Footprinting
Module 03: Scanning Networks
- Overview of Network Scanning
- Scanning Methodology
- Check for Live Systems
- Banner Grabbing
- Scan for Vulnerability
- Prepare Proxies
- Scanning Pen Testing
Module 04: System Hacking
- Information at Hand Before System Hacking Stage
- System Hacking: Goals
- Hacking Methodology (CHM)
- System Hacking Steps
- Cracking Passwords
- How Hash Passwords Are Stored in Windows SAM?
- Keylogger
- Spyware
- Child Monitoring Spyware
- Hiding Files
- Covering Tracks
- Penetration Testing
Module 05: Viruses,Worms Trojans,Backdoors(MALWARE)
- Virus and Worms Concepts
- Types of Viruses
- Computer Worms
- Malware Analysis
- Countermeasures
- Anti-virus Tools
- Trojan Detection
- Countermeasures
- Trojan Countermeasures
- Backdoor Countermeasures
- Trojan Horse Construction Kit
- Anti-Trojan Software
Module 06: Sniffers
- Sniffing Concepts
- MAC Attacks
- ARP
- Spoofing Attack
- DNS Poisoning
- Sniffing Tools
- Countermeasures
- Sniffing Pen Testing
Module 07: Social Engineering
- Social Engineering Concepts
- Social Engineering Techniques
- Impersonation on Social Networking Sites
- Identity Theft
- Social Engineering Countermeasures
- Social Engineering Pen Testing
- Social Engineering Pen Testing: Using Emails
- Social Engineering Pen Testing: Using Phone
- Social Engineering Pen Testing: In Person
- Social Engineering Pen Testing: Social Engineering Toolkit (SET)
Module 10: Denial of Service
- DoS/DDoS Concepts
- DoS Attack Techniques
- Botnet
- DDoS Case Study
- DoS Attack Tools
- Countermeasures
- DoS/DDoS Protection Tools
- DoS/DDoS Protection Tools
Module 08: Hacking Webservers
- Webserver Concepts
- Webserver Attacks
- Attack Methodology
- Countermeasures
- Webserver Security Tools
Module 09: Hacking Web Applications
- Web App Concepts
- Web App Threats
- Web App Hacking Methodology
- Footprint Web Infrastructure
- Web Application Hacking Tools
- Countermeasures
- Security Tools
Module 10: SQL Injection
- SQL Injection Concepts
- Testing for SQL Injection
- Types of SQL Injection
- Blind SQL Injection
- SQL Injection Methodology
- Advanced SQL Injection
- SQL Injection Tools
- Evasion Techniques
- Countermeasures
Module 11: Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wi-Fi Discovery
- Crack Wi-Fi Encryption
- Wireless Hacking Tools
- Countermeasures
Module 12: Evading IDS, Firewalls, and Honeypots
- IDS, Firewall and Honeypot Concepts
- IDS, Firewall and Honeypot System
- Evading IDS
- Evading Firewalls
- Detecting Honeypots
- Firewall Evading Tools
- Countermeasures
- Penetration Testing
Module 13: Cryptography
- Cryptography Concepts
- Encryption Algorithms
- Cryptography Tools
- Public Key Infrastructure(PKI)
- Email Encryption
- Disk Encryption
- Cryptography Attacks
- Cryptanalysis Tools
Ethical Hacking Training Center | Ethical Hacking Institute | Ethical Hacking Classes