Ethical Hacking
Ethical Hacking
Prerequisite – Basic computer & network knowledge
Duration – 45 hrs
Training Fee includes the following :
- Class recordings
- Create Lab environment on your PC
- Software's
- Assignments
- E-Books & Other study materials.
CEH v10/ Ethical Hacking
1. Introduction to Ethical Hacking
a. Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
b. Information Security Overview
c. Information Security Threats and Attack Vectors
d. Hacking Concepts, Types, and Phases
e. Ethical Hacking Concepts and Scope
f. Information Security Controls
g. Information Security Laws and Standards
2. Footprinting and Reconnaissance
a. Footprinting Concepts
b. Footprinting Methodology
i. Footprinting through Search Engines
ii. Footprinting using Advanced Google Hacking Techniques
iii. Footprinting through Social Networking Sites
iv. Website Footprinting
v. Email Footprinting
vi. Competitive Intelligence
vii. WHOIS Footprinting
viii. DNS Footprinting
ix. Network Footprinting
x. Footprinting through Social Engineering
c. Footprinting Tools
d. Footprinting Countermeasures
e. Footprinting Penetration Testing
3. Scanning Networks
a. Overview of Network Scanning
b. CEH Scanning Methodology
i. Check for Live Systems
ii. Check for Open Ports
iii. Scanning Beyond IDS
iv. Banner Grabbing
v. Scan for Vulnerability
vi. Draw Network Diagrams
vii. Prepare Proxies
c. Scanning Pen Testing
4. Enumeration
a. Enumeration Concepts
b. NetBIOS Enumeration
c. SNMP Enumeration
d. UNIX/Linux Enumeration
e. LDAP Enumeration
f. NTP Enumeration
g. SMTP Enumeration
h. DNS Enumeration
i. Enumeration Countermeasures
j. SMB Enumeration Countermeasures
k. Enumeration Pen Testing
5. Vulnerability Analysis
a. Vulnerability Assessment Concepts
b. Vulnerability Assessment Solutions
c. Vulnerability Scoring Systems
d. Vulnerability Assessment Tools
i. Qualys Vulnerability Management
ii. Nessus Professional
iii. GFI LanGuard
iv. Qualys FreeScan
v. Nikto
vi. OpenVAS
vii. Retina CS
viii. SAINT
ix. Microsoft Baseline Security Analyzer (MBSA)
x. AVDS - Automated Vulnerability Detection System
xi. Vulnerability Assessment Tools
xii. Vulnerability Assessment Tools for Mobile
e. Vulnerability Assessment Reports
i. Analyzing Vulnerability Scanning Report
6. System Hacking
a. Information at Hand Before System Hacking Stage
b. System Hacking: Goals
c. CEH Hacking Methodology (CHM)
d. CEH System Hacking Steps
e. Cracking Passwords
f. Escalating Privileges
g. Executing Applications
h. Spyware
i. Hiding Files
j. Covering Tracks
k. Penetration Testing
7. Malware Threats
a. Introduction to Malware
b. Trojan Concepts
c. Types of Trojans
d. Virus and Worms Concepts
e. Malware Reverse Engineering
f. Malware Detection
g. Countermeasures
h. Anti-Malware Software
i. Penetration Testing
8. Sniffing
a. Sniffing Concepts
b. MAC Attacks
c. DHCP Attacks
d. ARP Poisoning
e. Spoofing Attack
f. DNS Poisoning
g. Sniffing Tools
h. Counter measures
i. Sniffing Detection Techniques
j. Sniffing Pen Testing
9. Social Engineering
a. Social Engineering Concepts
b. Social Engineering Techniques
c. Imperso-nation on Social Networking Sites
d. Identity Theft
e. Social Engineering Countermeasures
f. Penetration Testing
10. Denial of Service
a. DoS/DDoS Concepts
b. DoS Attack Techniques
c. Botnet
d. DDoS Case Study
e. DoS Attack Tools
f. Counter-measures
g. DoS/DDoS Protection Tools
h. DoS/DDoS Attack Penetration Testing
11. Session Hijacking
a. Session Hijacking Concepts
b. Application Level Session Hijacking
c. Network-level Session Hijacking
d. Session Hijacking Tools
e. Counter-measures
f. Session Hijacking Pen Testing
12. Hacking Webservers
a. Webserver Concepts
b. Webserver Attacks
c. Attack Methodology
d. Webserver Attack Tools
e. Counter-measures
f. Patch Management
g. Webserver Security Tools
h. Webserver Pen Testing
13. Hacking Web Applications
a. Web App Concepts
b. Web App Threats
c. Web App Hacking Methodology
d. Web Application Hacking Tools
e. Countermeasures
f. Security Tools
g. Web App Pen Testing
14. SQL Injection
a. SQL Injection Concepts
b. Testing for SQL Injection
c. Types of SQL Injection
d. SQL Injection Methodology
e. SQL Injection Tools
f. Evasion Techniques
g. Counter-measures
15. Hacking Wireless Networks
a. Wireless Concepts
b. Wireless Encryption
c. Wireless Threats
d. Wireless Hacking Methodology
e. Wireless Hacking Tools
f. Bluetooth Hacking
g. Counter-measures
h. Wireless Security Tools
i. Wi-Fi Pen Testing
16. Hacking Mobile Platforms
a. Mobile Platform Attack Vectors
b. Hacking Android OS
c. Hacking iOS
d. Hacking Windows Phone OS
e. Hacking BlackBerry
f. Mobile Device Management (MDM)
g. Mobile Security Guidelines and Tools
h. Mobile Pen Testing
17. Evading IDS, Firewalls, and Honeypots
a. IDS, Firewall and Honeypot Concepts
b. IDS, Firewall and Honeypot System
c. Evading IDS
d. Evading Firewalls
e. Detecting Honeypots
f. IDS/Firewall Evading Tools
g. Detecting Honeypots
h. IDS/Firewall Evasion Counter-measures
i. Penetration Testing
18. IoT Hacking
a. IoT Concepts
b. IoT Attacks
i. DDoS Attack
ii. Exploit HVAC
iii. Rolling Code Attack
iv. BlueBorne Attack
v. Jamming Attack
vi. Hacking Smart Grid / Industrial Devices: Remote Access using Backdoor
vii. Othr IoT Attacks
viii. IoT Attacks in Different
c. IoT Hacking Methodology
d. What is IoT Device Hacking?
e. IoT Hacking Tools
i. Information Gathering Tools
ii. Sniffing Tools
iii. Vulnerability Scanning Tools
iv. IoT Hacking Tools
f. Countermeasures
i. How to Defend Against IoT Hacking
ii. General Guidelines for IoT Device Manufacturing Companies
iii. OWASP Top 10 IoT Vulnerabilities Solutions
iv. IoT Security Tools
19. Cloud Computing
a. Introduction to Cloud Computing
b. Cloud Computing Threats
c. Cloud Computing Attacks
d. Cloud Security
e. Cloud Security Tools
f. Cloud Penetration Testing
20. Cryptography
a. Market Survey 2014: The Year of Encryption
b. Case Study: Heartbleed
c. Case Study: Poodlebleed
d. Cryptography Concepts
e. Encryption Algorithms
f. Cryptography Tools
g. Public Key Infrastructure(PKI)
h. Email Encryption
i. Disk Encryption
j. Cryptography Attacks
k. Cryptanalysis Tools
l. IDS, Firewall and Honeypot Concepts
m. IDS, Firewall and Honeypot System
n. Evading IDS
o. Evading Firewalls
p. Detecting Honeypots
q. Firewall Evading Tools
r. Countermeasures