Course Summary
This course covers:
• Information security controls, laws, and standards.
• Various types of footprinting, footprinting tools, and countermeasures.
• Network scanning techniques and scanning countermeasuresEnumeration techniques and enumeration countermeasures
• Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
• System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
• Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
• Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
• Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
• DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
• Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
• Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures.
• Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
• SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
• Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
• Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
• Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
• Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
• Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
• Threats to IoT and OT platforms and defending IoT and OT devices.
• Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
Course Outline:
• Introduction to Ethical Hacking
• Footprinting and reconnaissance
• Scanning Networks
• Enumeration
• System Networks
• Malware Threats
• Sniffing
• Social Engineering
• Denial-of-Service
• Session Hacking
• Hacking Webservers
• Hacking Web Applications
• SQL Injection
• Hacking Wireless Networks
• Hacking Mobile Platforms
• Evading IDS, Firewalls, and Honeypots
• Cloud Computing
• Cryptography
Other Popular Courses
Mastering Communication & Presentation Te...
- Duration: 4 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM
Nutanix Multicloud Infrastructure Design (NMC...
- Duration: 1 Days
- Language: English
- Level: Advanced
- Exam: Nutanix Certifi