Certify and Increase Opportunity.
Be
Govt. Certified White Hat Security
Introduction
- Ethical Hacking evolution and hacktivism
- Need and technical terms
- Skills needed and stages of hacking
Ethics
Planning
- Maintain anonymity
- Goal setting and target system identification
- Structuring, executing and reporting penetration test
Cryptography
- Evolution and data encryption methods
- Symmetric and Asymmetric key Cryptography
- Private and public key exchange
- Secret key cryptography
- Message Authentication and Hash functions
- Digital Signatures and public key infrastructure
Footprinting
Social Engineering
- Concepts
- Attack types (phishing, identity theft, URL obfuscation)
- Social network and call center social engineering
Physical Security
Network Scanning and Enumeration
- Scanning techniques (TCP scanning, ping sweep, OS fingerprinting, etc.)
- Scanners and analyzers like Nmap, backtrack Linux, metasploit, etc.
- HTTP tunneling and IP spoofing
- Enumerating null sessions and SNMP enumeration
Network Attacks
- TCP/IP packet formats and ports
- Router, switch and firewall vulnerability and security
- DoS, DDoS, session hijacking
Wireless Networks
- WEP, WPA authentication and WLAN discovery
- Attack techniques like MAC spoofing, DoS, etc.
- WLAN countermeasures
System Hacking
- Password relevance, types and vulnerabilities
- Spyware, root kit and steganography
- Trojans, worms, backdoors and sniffers
Windows Hacking
- Windows vulnerabilities
- Null sessions, sharing, patches and NetBIOS
- Windows memory protection, SEH and OllyDbg
Linux Hacking
Web Hacking
- SSH, FTP, telnet and E-mail attacks, and cache poisoning
- Web server misconfiguration and password cracking
- XSS, CSRF, SQL injection and man in middle attack
- VoIP attacks like eavesdropping, DoS, etc.
Emerging Trends
Apply for Ethical Hacking and Security Certification Now!!