Hacking being one of the most threats online needs systematic approach and technical expertise to manage, abort and restrict the access. The Ethical Hacking course is specifically emphasized to help achieve optimal information and security safeguarding –of course in a step by step articulated course curriculum. The attendee will be trained in five specific phase wherein he/she will graduate the skillset and knowledge at every phase. The aim of the course is to enable them to approach their target and achieve their goal each time. The Five level of graduating the course are Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
All the hacking tools and techniques have been clearly defined, explained in each five phases in an encyclopedic approach, so the trainee is able to identify, comprehend when an attack has been used against your own targets.
The reason behind naming it as “The Ethical Hackeing Course” is because Hackers use the same method and technique to attack your site; in order to combat and abort their attention using the same techniques as them, one can assess the security posture of an organization with the same approach, identify weaknesses and repair the problems even before they are recognized by the attacker, and help save the organization from being a cyber victim..
Ethical Hacking course will equip your technical expertise and will act as a protection shield against all odd & vulnerableattacks. During the course, the five stages will graduate your understanding and help you understand the physiological hacker's mindset, evaluating not just logical, but physical security. The course will help you explore all possible point of entry to find the weakest scope or penetration point in an organization. From the end user, the secretary, the CEO, misconfigurations, vulnerable times during migrations even information left in the dumpster.
Target Audience:This course is designed for Graduate Fresher’s who are looking for successful career in cyber security, IT professionals and who want to understand key IT security issues and how best to address them. The course will also be of benefit to IT systems analysts, designers and software developers.
Prerequisites:There is no prerequisite to attend this programme and basic understanding of Microsoft Windows operating systems; and familiarity with Linux would be an advantage.
Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
Information Security Overview
Information Security Threats and Attack Vectors
Hacking Concepts, Types, and Phases
Ethical Hacking Concepts and Scope
Information Security Controls
Physical Security
Incident Management
What is Vulnerability Assessment?
Penetration Testing
Information Security Laws and Standards
Module 2: Foot printing and ReconnaissanceFoot printing Concepts
Foot printing Methodology
Foot printing Tools
Foot printing Countermeasures
Foot printing Penetration Testing
Module 3: Scanning NetworksOverview of Network Scanning
Ethical Hacking Scanning Methodology
Module 4: EnumerationEnumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
SNMP Enumeration Tools
NTP Enumeration
SMTP Enumeration
Enumeration Countermeasures
SMB Enumeration Countermeasures
Enumeration Pen Testing
Module 5: System HackingInformation at Hand before System Hacking Stage
System Hacking: Goals
Hacking Methodology (CHM)
System Hacking Steps
Hiding Files
Covering Tracks
Penetration Testing
Module 6: Malware ThreatsIntroduction to Malware
Trojan Concepts
Types of Trojans
Virus and Worms Concepts
Malware Reverse Engineering
Countermeasures
Anti-Malware Software
Penetration Testing
Module 7:SniffingSniffing Concepts
MAC Attacks
DHCP Attacks
AR Poisoning
Spoofing Attack
DNS Poisoning
Sniffing Tools
Sniffing Tool: Wireshark
Follow TCP Stream in Wireshark
Display Filters in Wireshark
Additional Wireshark Filters
Packet Sniffing Tool: Caps Network Analyzer
Network Packet Analyzer
Counter measures
Sniffing Detection
Sniffing Pen Testing
Module 8:Social EngineeringSocial Engineering Concepts
Social Engineering Techniques
Impersonation on Social Networking Sites
Identity Theft
Social Engineering Countermeasures
Penetration Testing
Module 9: Denial-of-ServiceDos/DDoS Concepts
Dos/DDoS Attack Techniques
Botnets
DDoS Case Study
DoS/DDoS Attack Tools
Counter-measures
DoS/DDoS Protection Tools
DoS/DDoS Attack Penetration Testing
Module 10: Session HijackingSession Hijacking Concepts
Application Level Session Hijacking
Network-level Session Hijacking
Session Hijacking Tools
Counter-measures
Session Hijacking Pen Testing
Delivery method: Classroom / Attend from Anywhere