Ethical Hacking and Prevention

Similar documents
AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

Curso: Ethical Hacking and Countermeasures

Certified Ethical Hacker (CEH)

Course 831 Certified Ethical Hacker v9

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

CEH: CERTIFIED ETHICAL HACKER v9

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.

Mobile MOUSe HACKING REVEALED ONLINE COURSE OUTLINE

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Practice Labs Ethical Hacker

Certified Ethical Hacker

Advanced Diploma on Information Security

Module 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services

GCIH. GIAC Certified Incident Handler.

DIS10.1 Ethical Hacking and Countermeasures

CPTE: Certified Penetration Testing Engineer

DIS10.1:Ethical Hacking and Countermeasures

CETPA INFOTECH PVT. LTD. Curriculum of CYBER SECURITY DURATION: 6 MONTHS

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Certified Ethical Hacker Version 9. Course Outline. Certified Ethical Hacker Version Nov

POST GRADUATE DIPLOMA IN CYBER SECURITY (PGDCS)

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.

CS System Security 2nd-Half Semester Review

Endpoint Security - what-if analysis 1

CRAW Security. CRAW Security

Security+ SY0-501 Study Guide Table of Contents

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Access Controls. CISSP Guide to Security Essentials Chapter 2

"Charting the Course... Certified Professional Ethical Hacker. Course Summary

Audience. Pre-Requisites

CSWAE Certified Secure Web Application Engineer

Certified Professional Ethical Hacker

CEH Tools. Sniffers. - Wireshark: The most popular packet sniffer with cross platform support.

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA E2C Security+ (2008 Edition) Exam Exam.

CHCSS. Certified Hands-on Cyber Security Specialist (510)

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

CompTIA Security+ (Exam SY0-401)

What action do you want to perform by issuing the above command?

Chapter 4. Network Security. Part I

CompTIA Security+(2008 Edition) Exam

Ethical Hacking. Content Outline: Session 1

Certified Professional Ethical Hacker

Certified Secure Web Application Engineer

CompTIA Security+ (2008 Edition) Exam

ECCouncil Certified Ethical Hacker. Download Full Version :

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

CPEH Certified Professional Ethical Hacker

EC-Council. Program Brochure. EC-Council. Page 1

Certified Ethical Hacker V9

Hacking Terminology. Mark R. Adams, CISSP KPMG LLP

Accounting Information Systems

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

C EHP Certified Ethical Hacking Professional

Certified Vulnerability Assessor

Certified Cyber Security Analyst VS-1160

ITSY 2330 Intrusion Detection Course Syllabus

CompTIA Security+ Certification

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

BraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!

Hackers. Types White hat Black hat Grey hat Suicidal Categories Coder Admin Script Kiddies

Chapter 11: Networks

ITdumpsFree. Get free valid exam dumps and pass your exam test with confidence


SANS Exam SEC504 Hacker Tools, Techniques, Exploits and Incident Handling Version: 7.1 [ Total Questions: 328 ]

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

Network Security Issues and New Challenges

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Securing Information Systems

CYBERSECURITY PROFESSIONAL PENETRATION TESTER

SYLLABUS DATE OF LAST REVIEW: 012/2016 CIP CODE: Departmental Syllabus SEMESTER: Information Assurance COURSE TITLE: CIST0225 COURSE NUMBER:

CompTIA Cybersecurity Analyst+

Introduction to Penetration Testing: Part One. Eugene Davis UAH Information Security Club February 21, 2013

ECCouncil Exam v8 Certified Ethical Hacker v8 Exam Version: 7.0 [ Total Questions: 357 ]

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Course Outline (version 2)

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

Ethical Hacking : Methodology and techniques

GSLC. GIAC Security Leadership.

Transcription:

Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. In a span of 2 weeks, we take you from novice to expert in ethical hacking. This is the only course which teaches both hacking and counter measure techniques. This course is entirely hands on and real time oriented. And need we say the instructors are network security and intrusion specialists with several years of experience.

Course Outline INTRODUCTION TO ETHICAL HACKING What is Hacking Who is a Hacker Skills of a Hacker Types of Hackers Reasons for Hacking Who are at the risk of Hacking attacks Effects of Computer Hacking on an organization Network Security Challenges Elements of Information Security The Security, Functionality & Usability Triangle What is Ethical Hacking Why Ethical Hacking is Necessary Scope & Limitations of Ethical Hacking What is Penetration Testing What is Vulnerability Auditing FOOTPRINTING What is FootPrinting Objectives of FootPrinting Finding a company s details Finding a company s domain name Finding a company s Internal URLs Finding a company s Public and Restricted URLs Finding a company s Server details Finding the details of domain registration Finding the range of IP Address Finding the DNS information Finding the services running on the server Finding the location of servers Traceroute analysis Tracking e-mail communications SCANNING What is network scanning Objectives of network scanning Finding the live hosts in a network SNMP Enumeration SMTP Enumeration DNS Enumeration Finding open ports on a server Finding the services on a server OS fingerprinting Server Banner grabbing tools What is a Vulnerability Scanning Vulnerability Scanner tools Finding more details about a vulnerability What is a proxy server How does proxy server work Types of proxy servers How to find proxy servers Why do hackers use proxy servers What is a TOR network Why hackers prefer to use TOR networks HACKING WEB SERVERS & WEB APPLICATIONS What is a web server Different web server applications in use Why are web servers hacked & its consequences Directory traversal attacks Website defacement Website password brute forcing How to defend against web server hacking SESSION HIJACKING What is session hijacking Dangers of session hijacking attacks Session hijacking techniques Cross-Site scripting attack Session hijacking tools How to defend against session hijacking SQL INJECTION What is SQL Injection Effects of SQL Injection attacks Types of SQL Injection attacks SQL Injection detection tools EVADING FIREWALLS, IDS & HONEYPOTS What is a Firewall What are the functions of a Firewall What is an IDS How does an IDS work

SPAN IDS tools What is a honeypot Types of honeypots Honeypot tools Honeypot detection tools BUFFER OVERFLOW What is a buffer Understanding usage of buffers in applications What is buffer overflow Simple buffer overflow in C programming How to detect a buffer overflow How to defend against buffer overflow attacks DENIAL OF SERVICE What is a DoS attack What is a DDoS attack Symptoms of a Dos attack DoS attack techniques What is a Botnet Defending against DoS attacks CRYPTOGRAPHY What is Cryptography Types of cryptography Cipher algorithms Public key infrastructure What is a Hash Cryptography attacks SYSTEM HACKING What is system Hacking Goals of System Hacking Password Cracking Password complexity Finding the default passwords of network devices and softwares Password cracking methods o Online password cracking Man-in-the-middle attack Password guessing o Offline password cracking Brute force cracking Dictionary based cracking Hybrid attack USB password stealers Elcomsoft Distributed password recovery tools Active password changer What is a keylogger How to deploy a keylogger to a remote pc How to defend against a keylogger SNIFFERS What is a sniffer How sniffer works Types of sniffing o Active sniffing o Passive Sniffing What is promiscuous mode How to put a PC into promiscuous mode What is ARP ARP poison attack Threats of ARP poison attack How MAC spoofing works MAC Flooding What is a CAM Table How to defend against MAC Spoofing attacks How to defend against Sniffers in network PHISHING What is Phishing How Phishing website is hosted How victims are tricked to access phishing websites How to differentiate a Phishing webpage from original webpage How to defend against Phishing attacks MALWARE What is malware Types of malware o Virus What is a virus program What are the properties of a virus program How does a computer get infected by virus Types of virus Virus making tools

How to defend against virus attacks o Worm What is a worm program How worms are different from virus Trojan What is a Trojan horse How does a Trojan operate Types of Trojans Identifying Trojan infections How to defend against Trojans o Spyware What is a spyware Types of spywares How to defend against spyware Rootkits What is a Rootkit Types of Rootkits How does Rootkit operate How to defend against Rootkits WIRELESS HACKING Types of wireless networks Wi-Fi usage statistics Finding a Wi-Fi network Types of Wi-Fi authentications o Using a centralized authentication server o Using local authentication Types of Wi-Fi encryption methods o WEP o WPA o WPA2 How does WEP work Weakness of WEP encryption How does WPA work How does WPA2 work Hardware and software required to crack Wi-Fi networks How to crack WEP encryption How to crack WPA encryption How to crack WPA2 encryption How to defend against Wi-Fi cracking attack KALI LINUX What is Kali Linux How Kali Linux is different from other Linux distributions What are the uses of Kali Linux Tools for Footprinting, Scanning & Sniffing What is metasploit framework Using metasploit framework to attack windows machines Using metasploit framework to attack android devices PENETRATION TESTING What is Penetration Testing Types of Penetration Testing What is to be tested o Testing the network devices for mis-configuration o Testing the servers and hosting applications for mis-configuration o Testing the servers and hosting applications for vulnerabilities o Testing wireless networks o Testing for Denial of Service attacks COUNTER MEASURE TECHNIQUES FOR NETWORK LEVEL ATTACKS Types of Firewall o Packet Filtering Firewall o Circuit-Level Gateway Firewall o Application-Level Firewall o Stateful Multilayer Inspection Firewall o Limitations of a Firewall IDS / IPS o What is an IDS o What is a IPS o Difference between IDS & IPS o Placement of IDS in the Network o Configuring an IDS in the Network o Placement of IPS in the Network o Configuring an IPS in the Network UTM / Next-Generation Firewall o What is a UTM o Features of UTM o Difference between a Firewall & a UTM o Placement of UTM in the Network

o Configuring a UTM in the Network o Monitoring attacks using UTM o Configuring IPS module in UTM to detect and stop attacks COUNTER MEASURE TECHNIQUES FOR LOCAL SYSTEMS Identifying the Vulnerabilities of a system Understanding the Vulnerabilities of a system o CVE ID o Bugtraq ID Patch Management o Identifying the patch for a Vulnerability o Downloading the Patch o Testing the patch for stability in test environment o Deploying the patch to Live Network Finding the missing updates in an Operating System o Microsoft Baseline Security Analyzer o Belarc Advisor COUNTER MEASURE TECHNIQUES FOR MALWARE ATTACKS Scanning systems for Malware infections Types of anti-malwares o Anti-Virus o Anti-Worm o Anti-Trojan o Anti-Rootkit o Internet Security Suites HIDS and HIPS