Prerequisites
To apply for the Ethical Hacking Training, you need to either:
- You should have a basic understanding of computer networking concepts like TCP/IP, DNS and firewalls
- You should have a basic understanding of Operating systems like Windows & Linux
- You should have a basic understanding of security concepts like access control, encryption and authentication
- You should also be familiar with at least one programming language like Java, Ruby or Python.
Course Curriculum
Module 1: Introduction to Ethical Hacking
- Overview of Information Security
- Information Security Threats and Attack Vectors
- Hacking Concepts, Types, and Phases
- Ethical Hacking Concepts and Scope
- Information Security Controls
- Physical Security
- Incident Management
- What is Vulnerability Assessment?
- Penetration Testing
- Information Security Laws and Standards
Module 2: Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting Methodology
- Footprinting Tools
- Footprinting Countermeasures
- Footprinting Penetration Testing
- Website and Email FootPrinting
- FootPrinting using Social Networking Sites
- Network and DNS FootPrinting
- FootPrinting using Search Engines and Web Services
- Concepts of Whois FootPrinting
- FootPrinting via Social Engineering
- Collecting Competitive Intelligence
Module 3: Scanning Networks
- Overview of Network Scanning
- CEH Scanning Methodology
- Scanning tools and techniques
- Scanning Penetration Testing
- Extract Network Diagrams
- Scanning IDS and Firewall
- Banner Grabbing Process
Module 4: Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- SNMP Enumeration Tools
- LDAP Enumeration
- NTP Enumeration
- SMTP Enumeration
- Enumeration Countermeasures
- SMB Enumeration Countermeasures
- Enumeration Pen Testing
- DNS Enumeration
- Additional Techniques of Enumeration
Module 5: System Hacking
- Information at Hand Before System Hacking Stage
- System Hacking: Goals
- Hacking Methodology (CHM)
- System Hacking Steps
- Hiding Files
- Covering Tracks
- Penetration Testing
- Concepts of Password Cracking
- Implementing Applications using tools
- Escalating Privileges
Module 6: Sniffing
- Sniffing Concepts
- MAC Attacks
- DHCP Attacks
- ARP Poisoning
- Spoofing Attack
- DNS Poisoning
- Sniffing Tools
- Sniffing Tool: Wireshark
- Follow TCP Stream in Wireshark
- Display Filters in Wireshark
- Additional Wireshark Filters
- Packet Sniffing Tool: Capsa Network Analyzer
- Network Packet Analyzer
- Counter measures
- Sniffing Detection
- Sniffing Pen Testing
Module 7: Malware Threats
- Introduction to Malware
- Trojan Concepts
- Types of Trojans
- Virus and Worms Concepts
- Malware Reverse Engineering
- Countermeasures
- Anti-Malware Software
- Penetration Testing
Module 8: Social Engineering
- Social Engineering Concepts
- Social Engineering Techniques
- Impersonation on Social Networking Sites
- Identity Theft
- Social Engineering Countermeasures
- Penetration Testing
- Insider Threats
Module 9: Denial-of-Service
- DoS/DDoS Concepts
- DoS/DDoS Attack Techniques
- Botnets
- DDoS Case Study
- DoS/DDoS Attack Tools and Counter-measures
- DoS/DDoS Protection Tools
- DoS/DDoS Attack Penetration Testing
Module 10: Session Hijacking
- Session Hijacking Concepts
- Application Level Session Hijacking
- Network-level Session Hijacking
- Session Hijacking Tools
- Counter-measures
- Session Hijacking Pen Testing
- IPsec
Module 11: Hacking Web Servers
- Web Server Concepts
- Web Server Attacks
- Attack Methodology
- Webserver Attack Tools
- Counter-measures
- Patch Management
- Webserver Security Tools
- Webserver Pen Testing
Module 12: Hacking Web Applications
- Web App Concepts
- Web App Threats
- Web App Hacking Methodology
- Web Application Hacking Tools
- Countermeasures
- Security Tools
- Web App Pen Testing
- Web Application Pen Testing Framework
- Web App Security Testing Tools
Module 13: Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Hacking Tools
- Bluetooth Hacking
- Counter-measures
- Wireless Security Tools
- Wi-Fi Pen Testing
Module 14: SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- Evasion Techniques
- Counter-measures
Module 15: Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Hacking Windows Phone OS
- Hacking BlackBerry
- Mobile Device Management (MDM)
- Mobile Security Guidelines and Tools
- Mobile Pen Testing
- Mobile Spyware
Module 16: Evading IDS, Firewalls, and Honeypots
- IDS, Firewall and Honeypot Concepts
- IDS, Firewall, and Honeypot Solution
- Evading IDS
- Evading Firewalls
- IDS/Firewall Evading Tools
- Detecting Honeypots
- IDS/Firewall Evasion Counter-measures
- Penetration Testing
- Honeypot Tools
- IDS Evasion Methods
Module 17: Cloud Computing
- Introduction to Cloud Computing
- Cloud Computing Threats
- Cloud Computing Attacks
- Cloud Security
- Cloud Security Tools
- Cloud Penetration Testing
Module 18: Cryptography
- Market Survey 2014: The Year of Encryption
- Case Study: Heartbleed
- Case Study: Poodlebleed
- Cryptography Concepts
- Encryption Algorithms
- Cryptography Tools
- Public Key Infrastructure (PKI)
- Email Encryption
- Disk Encryption
- Cryptography Attacks
- Cryptanalysis Tools
- Cryptography Counter Attacks
Module 19: Analysis of Vulnerabilities
- Concepts of Vulnerability Evaluation
- Vulnerability Scoring Systems
- Evaluation Tools of Vulnerability
- Vulnerability Evaluation Solutions
- Vulnerability Evaluation Reports
Module 20: Hacking Internet of Things (IoT)
- Basic concepts of IoT
- About Internet of Things Attacks
- IoT Hacking tools
- Hacking Methodology of IoT
- IoT Pen Testing Concepts
- IoT Counterattacks