Course Outline
 

 

Introduction

  • Ethical Hacking Evolution and Hacktivism
  • Need and Technical Terms
  • Skills Needed and Stages of Hacking
  • Ethical Hacking Modes
  • Networking Basics
  • Penetration Testing

Ethics

  • Moral Direction and Hacker Ethics Principles
  • Security Grey Areas
  • Cyber Laws (IT Act, etc.)
  • Rules of Engagement

Cryptography

  • Cryptography Basics
  • Evolution and Data Encryption Methods
  • Symmetric and Asymmetric key Cryptography
  • Private and Public Key Exchange
  • Stream and Block Ciphers
  • Secret Key Cryptography
  • Message Authentication and Hash Functions
  • Digital Signatures and Public Key Infrastructure

Footprinting

  • Information Gathering
  • DNS, whois and ARIN records
  • Using traceroute, e-mail tracking and web spider
  • Google Hacking

Social Engineering

  • Social Engineering Concepts
  • Social Engineering Attack Types
  • Countermeasures for Social Engineering

Physical Security

  • Basics and Need
  • Physical Security Countermeasures

Network Scanning and Enumeration

  • Network Scanning Techniques
  • Scanners and Analyzers
  • HTTP tunneling and IP spoofing
  • Enumerating null sessions and SNMP enumeration

Network Attacks

  • TCP/IP Packet Formats and Ports
  • Firewall and IDS
  • Switch Attacks
  • Router Attacks
  • DoS, DDoS, Session Hijacking

Wireless Networks

  • Wireless LAN Basics
  • WLAN Security
  • WLAN Attacks
  • WLAN Attack Countermeasures

System Hacking

  • Password Attacks, Vulnerabilities and Countermeasure
  • Spyware
  • Rootkit
  • Steganography
  • Trojans
  • Computer worm
  • Backdoor
  • Buffer Overflow

Windows Hacking

  • Memory and Process
  • Windows Architecture
  • Windows Security
  • Windows Attacks
  • Countermeasures
  • Windows Memory Protection, SEH and OllyDbg

Linux Hacking

  • Linux Basics
  • Linux Threats
  • Linux Security
  • Kernel Patching

Web Hacking

  • Web Basics
  • Web Server Attacks
  • Web Application Attacks
  • VoIP Attacks

Emerging Trends

  • Cloud Computing and Security
  • Identity Access Management
  • Security Policies
  • Mobile Security
  • New Threats

Apply for Certification

https://www.vskills.in/certification/Certified-Ethical-Hacking-and-Security-Professional