-
Introduction to Ethical Hacking
Introducing the topic of ethical hacking, historic data breaches in the world, various aspects of information security, how information security attacks happen, OS attacks, application-level attack, various types, phases and concepts of hacking, scanning, gaining access and maintaining access, clearing tracks, concepts and scope of ethical hacking, enterprise information security architecture, vulnerability assessment, penetration testing, information security laws and standards, various cyber security laws.
-
System Hacking Types
What is system hacking, the goals of system hacking, understanding the certified ethical hacker methodology, the various steps in ethical hacking, decoding the password, rule-based and brute attack, understanding keylogger, Trojan, and spyware, passive online and hash engine attack, distributed network attack, understanding the various spyware like audio, video, phone and GPS, detecting Rootkits, what is stenography, covering the tracking.
-
Introduction to Footprinting
Introduction to footprinting, objectives, concepts and methodologies, gathering information using groups, forums, blogs, Google Hacking Techniques, competitive intelligence tracking, WHOIS lookup result analysis, traceroot analysis, footprinting tools, footprinting penetration test.
-
Ethical Hacking enumeration
What is enumeration in ethical hacking, used for information gathering, the various techniques for ethical hacking, NetBIOS enumeration tool, Simple Network Management Protocol enumeration, the tools used in SNMP enumeration, SuperScan, LDAP enumeration, enumeration counter testing, enumeration pen testing.
-
Network Scanning
How to scan the network, overview of scanning, how to create custom packet with TCP flags, checking open ports, various tools for scanning, scanning techniques, full open scan, scanning the IPv6 network, countermeasures in port scanning, scanning for vulnerabilities, network discovery tool, proxy server and tools, understanding anonymizer, IP address spoofing, detecting spoofing, TCP flow control method.
-
Hacking Web servers and applications
How web applications work, the architecture of web applications, web app threats, web app hacking methodology, authorization attack schemes, attack session management mechanism, attacking web app client, counter measures and security tools.
-
Wireless Network Hacking
Wireless network terminologies, standards and technologies, wireless encryption, WiFi chalking, wireless encryption, WEP problems, threats to wireless networks, various methods of wireless hacking, wireless traffic analysis, GPS mapping tools, launching wireless network attacks, cracking a wireless encryption, tools for wireless hacking, countermeasures and wireless security tools.
-
Mobile platform hacking
Various risk areas in mobile platform, hacking of Android devices, Android Trojans, hacking iOS devices, hacking Windows phone OS, managing mobile devices, various security guidelines and tools in mobile security, mobile penetration testing toolkit.