About the Academy

  1. Validates a person’s knowledge and understanding of information security threats.
  2. Scanning networks
  3. Foot-printing
  4. Cryptography and system hacking
  5. Enumeration, trojans and backdoors, sniffers.
  6. Hack web servers, web applications and wireless networks
  7. Viruses, worm detection among other information security threats

Prerequisites

Have a working knowledge of TCP/IP, a background in either security or information systems as well as at least a year of experience working with networking technologies.

Who is target audience

This course is best-suited for:
  • Security officers
  • Auditors
  • Site administrators
  • IS / IT Specialist / Analyst / Manager
  • IS / IT Auditor / Consultant
  • IT Operations Manager
  • Security Specialist / Analyst
  • Security Manager / Architect
  • Security Consultant / Professional
  • Security Administrator
  • Network Specialist / Analyst
  • Network Manager / Architect
  • Network Consultant / Professional
  • Network Administrator
  • Technical Support Engineer
  • Senior Systems Engineer
  • Systems Analyst
  • Systems Administrator
  • Individuals
concerned about the integrity of the network infrastructure.

Curriculum


Module 1: Introduction to Ethical Hacking

  • 1.1  Information Security Overview
  • 1.2  Information Security Threats and Attack Vectors
  • 1.3  Hacking Concepts
  • 1.4   Types
  • 1.5   and Phases
  • 1.6  Ethical Hacking Concepts and Scope
  • 1.7  Information Security Controls
  • 1.8  Information Security Laws and Standards

Module 2: Footprinting and Reconnaissance

  • 2.1  Footprinting Concepts
  • 2.2  Footprinting Methodology
  • 2.3  Footprinting Tools
  • 2.4  Footprinting Countermeasures
  • 2.5  Footprinting Penetration Testing

Module 3: Scanning Networks

  • 3.1  Overview of Network Scanning
  • 3.2  CEH Scanning Methodology

Module 4: Enumeration

  • 4.1  Enumeration Concepts
  • 4.2  NetBIOS Enumeration
  • 4.3  SNMP Enumeration
  • 4.4  LDAP Enumeration
  • 4.5  NTP Enumeration
  • 4.6  SMTP Enumeration
  • 4.7  Enumeration Countermeasures
  • 4.8  SMB Enumeration Countermeasures
  • 4.9  Enumeration Pen Testing

Module 5: System Hacking

  • 5.1  System Hacking: Goals
  • 5.2  CEH Hacking Methodology (CHM)
  • 5.3  CEH System Hacking Steps
  • 5.4  Hiding Files
  • 5.5  Covering Tracks
  • 5.6  Penetration Testing

Module 6: Malware Threats

  • 6.1  Introduction to Malware
  • 6.2  Trojan Concepts
  • 6.3  Types of Trojans
  • 6.4  Virus and Worms Concepts
  • 6.5  Malware Reverse Engineering
  • 6.6  Malware Detection
  • 6.7  Countermeasures
  • 6.8  Penetration Testing

Module 7: Sniffing

  • 7.1  Sniffing Concepts
  • 7.2  MAC Attacks
  • 7.3  DHCP Attacks
  • 7.4  ARP Poisoning
  • 7.5  Spoofing Attack
  • 7.6  DNS Poisoning
  • 7.7  Sniffing Tools
  • 7.8  Sniffing Tool: Wireshark
  • 7.9  Follow TCP Stream in Wireshark
  • 7.10  Display Filters in Wireshark
  • 7.11  Additional Wireshark Filters
  • 7.12  Sniffing Tool
  • 7.13  Packet Sniffing Tool: Capsa Network Analyzer
  • 7.14  Network Packet Analyzer
  • 7.15  Counter measures
  • 7.16  Sniffing Detection Techniques
  • 7.17  Sniffing Pen Testing

Module 8: Social Engineering

  • 8.1  Social Engineering Concepts
  • 8.2  Social Engineering Techniques
  • 8.3  Impersonation on Social Networking Sites
  • 8.4  Identity Theft
  • 8.5  Social Engineering Countermeasures
  • 8.6  Penetration Testing

Module 9: Denial-of-Service(DOS)

  • 9.1  DoS/DDoS Concepts
  • 9.2  DoS/DDoS Attack Techniques
  • 9.3  Botnets
  • 9.4  DDoS Case Study
  • 9.5  DoS/DDoS Attack Tools
  • 9.6  Counter-measures
  • 9.7  DoS/DDoS Protection Tools
  • 9.8  DoS/DDoS Attack Penetration Testing

Module 10: Session Hijacking

  • 10.1  Session Hijacking Concepts
  • 10.2  Application Level Session Hijacking
  • 10.3  Network-level Session Hijacking
  • 10.4  Session Hijacking Tools
  • 10.5  Countermeasures
  • 10.6  Session Hijacking Pen Testing

Module 11: Hacking Web Servers

  • 11.1  Webserver Concepts
  • 11.2  Webserver Attacks
  • 11.3  Attack Methodology
  • 11.4  Webserver Attack Tools
  • 11.5  Countermeasures
  • 11.6  Patch Management
  • 11.7  Webserver Security Tools
  • 11.8  Webserver Pen Testing

Module 12: Hacking Web Applications

  • 12.1  Web App Concepts
  • 12.2  Web App Threats
  • 12.3  Web App Hacking Methodology
  • 12.4  Attack Web Servers
  • 12.5  Analyze Web Applications
  • 12.6  Attack Authentication Mechanism
  • 12.7  Authorization Attack Schemes
  • 12.8  Attack Session Management Mechanism
  • 12.9  Session Management Attack
  • 12.10  Perform Injection Attacks
  • 12.11  Injection Attacks/Input Validation Attacks
  • 12.12  Attack Data Connectivity
  • 12.13  Attack Web App Client
  • 12.14  Attack Web Services
  • 12.15  Web Application Hacking Tools
  • 12.16  Web Application Hacking Tools
  • 12.17  Countermeasures

Module 13: SQL Injection

  • 13.1  SQL Injection Concepts
  • 13.2  Types of SQL Injection
  • 13.3  SQL Injection Methodology
  • 13.4  SQL Injection Tools
  • 13.5  Evasion Techniques
  • 13.6  Counter-measures
  • 13.7  Snort Rule to Detect SQL Injection Attacks
  • 13.8  SQL Injection Detection Tools

Module 14: Hacking Wireless Networks

  • 14.1  Wireless Concepts
  • 14.2  Wireless Encryption
  • 14.3  WEP vs. WPA vs. WPA2
  • 14.4  WEP Issues
  • 14.5  Weak Initialization Vectors (IV)
  • 14.6  How to Break WEP Encryption
  • 14.7  How to Break WPA Encryption
  • 14.8  How to Defend Against WPA Cracking
  • 14.9  Wireless Threats
  • 14.10  Wireless Hacking Methodology
  • 14.11  How to Discover Wi-Fi Network Using Wardriving
  • 14.12  Wireless Traffic Analysis
  • 14.13  Wireless Cards and Chipsets
  • 14.14  Wi-Fi USB Dongle: AirPcap
  • 14.15  Wi-Fi Packet Sniffer
  • 14.16  What is Spectrum Analysis?
  • 14.17  Wi-Fi Packet Sniffers
  • 14.18  Launch Wireless Attacks
  • 14.19  Aircrack-ng Suite
  • 14.20  How to Reveal Hidden SSIDs
  • 14.21  Fragmentation Attack

Module 15: Hacking Mobile Platforms

  • 15.1  Mobile Platform Attack Vectors
  • 15.2  Hacking Android OS
  • 15.3  Hacking iOS
  • 15.4  Hacking Windows Phone OS
  • 15.5  Hacking BlackBerry
  • 15.6  Mobile Device Management (MDM)
  • 15.7  Mobile Security Guidelines and Tools
  • 15.8  Mobile Pen Testing

Module 16: Evading IDS, Firewalls, and Honeypots

  • 16.1  IDS
  • 16.2   Firewall and Honeypot Concepts
  • 16.3  Firewall
  • 16.4  IDS
  • 16.5   Firewall and Honeypot System
  • 16.6  Evading IDS
  • 16.7  Evading Firewalls
  • 16.8  IDS/Firewall Evading Tools
  • 16.9  Detecting Honeypots
  • 16.10  IDS/Firewall Evasion Counter-measures
  • 16.11  Penetration Testing

Module 17: Cloud Computing

  • 17.1  Introduction to Cloud Computing
  • 17.2  Cloud Computing Threats
  • 17.3  Cloud Computing Attacks
  • 17.4  Cloud Security
  • 17.5  Cloud Security Tools
  • 17.6  Cloud Penetration Testing

Module 18: Cryptography

  • 18.1  Cryptography Concepts
  • 18.2  Encryption Algorithms
  • 18.3  Cryptography Tools
  • 18.4  Public Key Infrastructure(PKI)
  • 18.5  Email Encryption
  • 18.6  Disk Encryption
  • 18.7  Cryptography Attacks
  • 18.8  Cryptanalysis Tools
Request a detailed syllabus.

Get Answers (Answering their questions)

What kind of learning does ITlearn360.com provide?

ITlearn360.com offers instructor-led online live sessions and classroom-based corporate trainings and bootcamps for various courses and certifications to the learners.

Who are the instructors @ITlearn360.com?

@ITlearn360.com, we have an instructor community of industry professionals who are working in leading organizations and are veterans in their respective fields. These experts belong to various industries and are willing to share their talent with learners like you.

Are classes @ITlearn360.com conducted through online video streaming?

Yes, the classes @ITlearn360.com are conducted through online video streaming where there is two-way communication between users and instructors. The users can speak by using a microphone, chat by sending a message through a chat window and share their screens with an instructor. For better understanding, users also get recorded video of the class.

Sign for next demo class