Ethical Hacking Training Modules
|
| Module 01: |
Preparing participants to handle information security with more clarity. |
| Module 02: |
Providing an in-depth understanding of IDS, firewalls, honeypots, and wireless hacking. |
| Module 03:
|
Imparting knowledge in advanced hacking concepts: hacking mobile devices and smartphones, corporate espionage, writing virus code, exploit writing, and reverse engineering |
| Module 04:
|
Providing expertise on advanced concepts such as network packet analysis, securing IIS and Apache web servers, Windows system administration using PowerShell, and hacking SQL and Oracle databases. |
|
Module 05:
|
Offering coverage of the latest developments in mobile and web technologies including Android OS 6 and Apps, iOS 9and Apps, BlackBerry 7 OS, Windows Phone 10 and HTML5.
|
| Module 06:
|
Advanced log management for information assurance. |
ETHICAL HACKING PROGRAM:
| Course Outline:
| Module 01: |
Welcome |
| Module 02: |
Building a LAB: Concepts |
| Module 03:
|
Building a LAB: Networking |
| Module 04:
|
Deploy a Kali Linux VM |
|
Module 05:
|
Adding Metasploitable to Your Lab
|
| Module 06:
|
Adding Windows to Your Lab |
|
Module 07:
|
Configure a Static IP on Kali |
|
Module 08:
|
Windows Evaluations |
|
Module 09:
|
Deploy Windows 8.1 |
|
Module 10:
|
Deploy Windows 2012 |
|
Module 11:
|
Deploy Windows 10 |
|
Module 12:
|
Deploy Windows 2016 |
|
Module 13:
|
Ethics and Hacking |
|
Module 14:
|
Hacking Vocabulary |
|
Module 15:
|
InfoSec Concepts |
|
Module 16:
|
Attack Categories, Types, and Vectors |
|
Module 17:
|
Attack Categories, Types, and Vectors |
|
Module 18:
|
Footprinting and Reconnaissance Concepts |
|
Module 19:
|
Search Engine Tools |
|
Module 20:
|
Hacking using Google |
|
Module 21:
|
Website Recon Tools |
|
Module 22:
|
Metagoofil Metadata Tool |
|
Module 23:
|
Email Headers for Footprinting |
|
Module 24:
|
Using WHOIS for Recon |
|
Module 25:
|
DNS Tools |
|
Module 26:
|
Network Scanning Overview |
|
Module 27:
|
Network Scanning Methodology |
|
Module 28:
|
Port Discovery |
|
Module 29:
|
Network Scanning Tools |
|
Module 30:
|
Stealth Idle Scanning |
|
Module 31:
|
OS and Application Fingerprinting |
|
Module 32:
|
Vulnerability Scanning |
|
Module 33:
|
Network Mapping Tools |
|
Module 34:
|
Proxy Servers |
|
Module 35:
|
Using Public Proxy Services |
|
Module 36:
|
Enumeration Concepts |
|
Module 37:
|
NetBIOS Enumeration |
|
Module 38:
|
SNMP Enumeration Concepts |
|
Module 39:
|
SNMP Enumeration Tools |
|
Module 40:
|
LDAP Enumeration Concepts |
|
Module 41:
|
LDAP Enumeration Example |
|
Module 42:
|
NTP Enumeration |
|
Module 43:
|
SMTP Enumeration |
|
Module 44:
|
System Hacking Overview |
|
Module 45:
|
Password Cracking Concepts |
|
Module 46:
|
Password Attack Example: MITM and Sniffing |
|
Module 47:
|
Rainbow Crack Lab Setup |
|
Module 48:
|
Rainbow Crack Demonstration |
|
Module 49:
|
Password Reset Hacking |
|
Module 50:
|
DHCP Starvation |
|
Module 51:
|
Remote Access |
|
Module 52:
|
Spyware |
|
Module 53:
|
NTFS Alternate Data Streams Exploit |
|
Module 54:
|
Steganography with OpenPuff |
|
Module 55:
|
Steganography with SNOW |
|
Module 56:
|
Covering Tracks |
|
Module 57:
|
Malware Overview |
|
Module 58:
|
Trojan Overview |
|
Module 59:
|
Creating a Trojan |
|
Module 60:
|
Virus Overview |
|
Module 61:
|
Virus Creation |
|
Module 62:
|
Detecting Malware |
|
Module 63:
|
Malware Analysis |
|
Module 64:
|
Hash File Verification |
|
Module 65:
|
Sniffing Overview |
|
Module 66:
|
CAM Table Attack and Port Security |
|
Module 67:
|
DHCP Snooping |
|
Module 68:
|
Dynamic ARP Inspection (DAI) |
|
Module 69:
|
Social Engineering |
|
Module 70:
|
Denial of Service (DoS) Attacks |
|
Module 71:
|
Session Hijacking |
|
Module 72:
|
Hacking Web Servers |
|
Module 73:
|
Buffer Overflow |
|
Module 74:
|
OWASP Broken Web Application Project |
|
Module 75:
|
Shellshock |
|
Module 76:
|
SQL Introduction |
|
Module 77:
|
SQL Injection |
|
Module 78:
|
Web App Vulnerabilities: WordPress |
|
Module 79:
|
Wireless Hacking |
|
Module 80:
|
Using an Android VM |
|
Module 81:
|
Malware for Mobile |
|
Module 82:
|
Mobile Device Risks and Best Practices |
|
Module 83:
|
Firewall Evasion |
|
Module 84:
|
Firewall ACL Example |
|
Module 85:
|
NAT and PAT fundamentals |
|
Module 86:
|
IDS/IPS Evasion |
|
Module 87:
|
Honeypots |
|
Module 88:
|
Cloud Computing |
|
Module 89:
|
CIA: Confidentiality, Integrity, and Availability |
|
Module 90:
|
Policies |
|
Module 91:
|
Quantifying Risk |
|
Module 92:
|
Separation of Duties |
|
Module 93:
|
Symmetrical Encryption Concepts |
|
Module 94:
|
Asymmetrical Encryption Concepts |
|
Module 95:
|
Control Types |
|
Module 96:
|
Multifactor Authentication |
|
Module 97:
|
Centralized Identity Management |
|
Module 98:
|
Kerberos and Single Sign On (SSO) |
|
Module 99:
|
Backups and Media Management |
|
Module 100:
|
Operations Security Controls |
|
Module 101:
|
Physical Security Controls |
|
Module 102:
|
Incident Response |
|
Module 103:
|
VPNs (21 min) |
|
Module 104:
|
Disaster Recovery Planning |
|
Module 105:
|
Pen Testing Tips |