Ethical Hacking

 Module: Introduction to ethical Hacking


What is Ethical Hacking?

Type of Ethical Hacking ?

Advantages Ethical Hacking ?

Disadvantages Ethical Hacking ?

Purpose of Hacking ?

Types of Hackers?

Code Ethics?

Types of attacks

Attacks vectors?

Phases of Hacking?

> Youtube

Module: Footprinting and Reconnaissance


What is Footprinting ? Types ?

Purpose of Footprinting ?

Objectives of Footprinting ?

Footprinting Threats ?

Footprinting Countermeasures ?

Footprinting Tools ?

Youtube


Module: Scanning networks, Enumeration and sniffing


Network Scanning and it's types ?

Objectives of Network Scanning ?

Scanning Techniques ?


What is Enumeration ? 

Enumeration Techniques ?

Enumeration  Types ?

Enumeration Countermeasures ?

What is Sniffing and it's types?

Sniffing  Techniques ?

Sniffing Countermeasures ?

wiretapping and it's types ?

Sniffing Packets ?

Sniffing Methods - ARP Spoofing  and MAC Flooding ?

Active and Passive Spoofing ?


Module: Trojans and other Attacks


Worms and Viruses and Trojans ? Types ?

Preventing Malware Attacks ?

Types of Attacks ?

Steganography ?

Social Engineering ?


Module: Hacking web servers, web applications and sql injection


Session hijacking : 

What is session hijacking ? 

Session hijacking techniques ?

Session hijacking process ? 

Types of session hijacking ?

Session hijacking countermeasures: protecting and preventing ?


Hacking web servers and web applications :

Web Server Attacks ?

stages of Web Server Attack ?

defending against Web Server Attack ?

Web application components ?

Web Server Architecture ?

Web Server Attack Vectors ?

Web application threats and counter measures ?


SQL Injection :

What is SQL injection ?

SQL injection threats ?

SQL injection attacks ?

SQL injection detection ?

Types of SQL injection ?

SQL injection methodology ?

SQL injection prevention and countermeasures ?


Module: Wireless network hacking, cloud computing security, cryptography, Pen testing:


Types of wireless Architecture ?

Wireless encryption techniques-WEP and WPA ?

Breaking WEP/WPA and defending WPA encryption ?

Wireless Sniffing ?

Types of cloud computing services ?

Threats and Attacks ?

Cryptography and its objectives ? 

Cryptography types ?

Cryptography attacks ?  

what is Pen Testing ?  > other

Types and techniques of pen testing ?

Phases of pen testing ?


0 Comments