In this course by TOSS Learning, you will learn to assess computer system security by using penetration testing techniques; scan, test and hack secure systems and applications, and gain hands-on experience with sniffing, phishing and exploitation tactics. This Ethical Hacking Course acts as the foundation stone in your career to be a Penetration Tester and providing security to networks and websites. With all the latest tools and real-time hacking techniques, this Ethical Hacking Course gives you practical approach and simulated environment to test the attacks and assess the vulnerabilities.
Introduction to Ethical Hacking
Internet Crime Current Report, The Security, Functionality, and Usability Triangle, Security Challenges, Who is a Hacker?, Defense in Depth, What is Penetration Testing?, Why Penetration Testing?
Footprinting and Reconnaissance
Foot printing Terminologies, What is Foot printing?, Finding a Company’s URL, Foot printing Through Job Sites, What a Hacker Can Do With Google Hacking?
Types of Scanning, Scanning: IDS Evasion Techniques, War Dialing, Vulnerability Scanning, Proxy Servers, Why do I Need HTTP Tunneling?,Spoofing IP Address.
Types of enumeration, what is enumeration, Techniques of enumeration,What is NetBIOS, SNMP, LINUX, LDA, NTP, SMTP & DNS enumeration.
Password cracking, techniques, Types of attacks, cracking Algorithms,keylogger, spywares, Root kits, what is Steganography, Covering tracks.
Trojans and Backdoors
What is Trojan?, purpose of Trojan, indication of Trojan attacks, common ports used by Trojans, how to infect system using Trojan, how to deploy a Trojan?, types of Trojan.
Viruses and Worms
Introduction to viruses, working of virus, virus analysis, types of viruses, how to write a virus, worm analysis, malware analysis, Antivirus tools.
Sniffing threats, types of sniffing, MAC attacks, DHCP attacks, ARP poisoning, spoofing attack, DNS poisoning, sniffing tools.
What is social engineering? effectiveness, common attacks of social engineering, Risks of social networking on corporate networks, identity theft, countermeasure.
Denial of Service
What is DoS&DDoS attack?, how DDos attack works?, Symptons of Dos attack, DoS attack techniques, BOTNET, DoS attack tools, DoS/ DDoS protection tools.
What is session hijacking, brute forcing, types of session hijacking, application level & network level session hijacking, TCP/IP hijacking, countermeasures.
Webserver concepts, webserver thefts, attack methodology, webserver attack tools, patch management, security tools, countermeasures.
Hacking Web Applications
Web app concepts, web app threats, Hacking methodologies, Web application hacking tools, countermeasures.
Introduction to SQL injections, SQL error messages, types of SQL injections, Simple SQL attacks, UNION & error based SQl injection, tools, detection tools.
Hacking Wireless networks
Types of wireless networks, types of wireless encryption, WEP encryption, What is WPA/WPA2, wireless hacking tools, wi-fi security tools, countermeasures.
Evading IDS, Firewalls & Honeypots
Intrusion detection system(IDS), Types of IDS, Firewall, Types of honeypots, how to setup honeypot, Evading IDS & firewall, evading tools, countermeasures.
Buffer Overflows(BoF), stack based & heap based BoF, steps, attacking real program, smashing the stack, BoF tools, ollyDbg Debugger, BoF countermeasures.
Types of cryptography, ciphers, AES, RC4, RC5, RC6 algorithms, RSA, MD5, SHA, cryptography tools, PKI, Digital signature, SSL, disk encryption, Cryptography attacks.
What is penetration testing, security assesments, Risk management, Automated testing, Hackershield, Pentest using various devices, VigilENT, WEBInspect.