Ethical Hacking Training Modules
|
Module 01: |
Preparing participants to handle information security with more clarity. |
Module 02: |
Providing an in-depth understanding of IDS, firewalls, honeypots, and wireless hacking. |
Module 03:
|
Imparting knowledge in advanced hacking concepts: hacking mobile devices and smartphones, corporate espionage, writing virus code, exploit writing, and reverse engineering |
Module 04:
|
Providing expertise on advanced concepts such as network packet analysis, securing IIS and Apache web servers, Windows system administration using PowerShell, and hacking SQL and Oracle databases. |
Module 05:
|
Offering coverage of the latest developments in mobile and web technologies including Android OS 6 and Apps, iOS 9and Apps, BlackBerry 7 OS, Windows Phone 10 and HTML5.
|
Module 06:
|
Advanced log management for information assurance. |
ETHICAL HACKING PROGRAM:
| Course Outline:
Module 01: |
Welcome |
Module 02: |
Building a LAB: Concepts |
Module 03:
|
Building a LAB: Networking |
Module 04:
|
Deploy a Kali Linux VM |
Module 05:
|
Adding Metasploitable to Your Lab
|
Module 06:
|
Adding Windows to Your Lab |
Module 07:
|
Configure a Static IP on Kali |
Module 08:
|
Windows Evaluations |
Module 09:
|
Deploy Windows 8.1 |
Module 10:
|
Deploy Windows 2012 |
Module 11:
|
Deploy Windows 10 |
Module 12:
|
Deploy Windows 2016 |
Module 13:
|
Ethics and Hacking |
Module 14:
|
Hacking Vocabulary |
Module 15:
|
InfoSec Concepts |
Module 16:
|
Attack Categories, Types, and Vectors |
Module 17:
|
Attack Categories, Types, and Vectors |
Module 18:
|
Footprinting and Reconnaissance Concepts |
Module 19:
|
Search Engine Tools |
Module 20:
|
Hacking using Google |
Module 21:
|
Website Recon Tools |
Module 22:
|
Metagoofil Metadata Tool |
Module 23:
|
Email Headers for Footprinting |
Module 24:
|
Using WHOIS for Recon |
Module 25:
|
DNS Tools |
Module 26:
|
Network Scanning Overview |
Module 27:
|
Network Scanning Methodology |
Module 28:
|
Port Discovery |
Module 29:
|
Network Scanning Tools |
Module 30:
|
Stealth Idle Scanning |
Module 31:
|
OS and Application Fingerprinting |
Module 32:
|
Vulnerability Scanning |
Module 33:
|
Network Mapping Tools |
Module 34:
|
Proxy Servers |
Module 35:
|
Using Public Proxy Services |
Module 36:
|
Enumeration Concepts |
Module 37:
|
NetBIOS Enumeration |
Module 38:
|
SNMP Enumeration Concepts |
Module 39:
|
SNMP Enumeration Tools |
Module 40:
|
LDAP Enumeration Concepts |
Module 41:
|
LDAP Enumeration Example |
Module 42:
|
NTP Enumeration |
Module 43:
|
SMTP Enumeration |
Module 44:
|
System Hacking Overview |
Module 45:
|
Password Cracking Concepts |
Module 46:
|
Password Attack Example: MITM and Sniffing |
Module 47:
|
Rainbow Crack Lab Setup |
Module 48:
|
Rainbow Crack Demonstration |
Module 49:
|
Password Reset Hacking |
Module 50:
|
DHCP Starvation |
Module 51:
|
Remote Access |
Module 52:
|
Spyware |
Module 53:
|
NTFS Alternate Data Streams Exploit |
Module 54:
|
Steganography with OpenPuff |
Module 55:
|
Steganography with SNOW |
Module 56:
|
Covering Tracks |
Module 57:
|
Malware Overview |
Module 58:
|
Trojan Overview |
Module 59:
|
Creating a Trojan |
Module 60:
|
Virus Overview |
Module 61:
|
Virus Creation |
Module 62:
|
Detecting Malware |
Module 63:
|
Malware Analysis |
Module 64:
|
Hash File Verification |
Module 65:
|
Sniffing Overview |
Module 66:
|
CAM Table Attack and Port Security |
Module 67:
|
DHCP Snooping |
Module 68:
|
Dynamic ARP Inspection (DAI) |
Module 69:
|
Social Engineering |
Module 70:
|
Denial of Service (DoS) Attacks |
Module 71:
|
Session Hijacking |
Module 72:
|
Hacking Web Servers |
Module 73:
|
Buffer Overflow |
Module 74:
|
OWASP Broken Web Application Project |
Module 75:
|
Shellshock |
Module 76:
|
SQL Introduction |
Module 77:
|
SQL Injection |
Module 78:
|
Web App Vulnerabilities: WordPress |
Module 79:
|
Wireless Hacking |
Module 80:
|
Using an Android VM |
Module 81:
|
Malware for Mobile |
Module 82:
|
Mobile Device Risks and Best Practices |
Module 83:
|
Firewall Evasion |
Module 84:
|
Firewall ACL Example |
Module 85:
|
NAT and PAT fundamentals |
Module 86:
|
IDS/IPS Evasion |
Module 87:
|
Honeypots |
Module 88:
|
Cloud Computing |
Module 89:
|
CIA: Confidentiality, Integrity, and Availability |
Module 90:
|
Policies |
Module 91:
|
Quantifying Risk |
Module 92:
|
Separation of Duties |
Module 93:
|
Symmetrical Encryption Concepts |
Module 94:
|
Asymmetrical Encryption Concepts |
Module 95:
|
Control Types |
Module 96:
|
Multifactor Authentication |
Module 97:
|
Centralized Identity Management |
Module 98:
|
Kerberos and Single Sign On (SSO) |
Module 99:
|
Backups and Media Management |
Module 100:
|
Operations Security Controls |
Module 101:
|
Physical Security Controls |
Module 102:
|
Incident Response |
Module 103:
|
VPNs (21 min) |
Module 104:
|
Disaster Recovery Planning |
Module 105:
|
Pen Testing Tips |