Certified Information Security Expert (CISE Level 1 v2) Detailed Course Module
Certified Information Security Expert (CISE Level 1 v2) Detailed Course Module
www.innobuzz.in
Chapter 1 Introduction
Concept of Security Physical and Digital Assets Security Triangle Introduction: Ethical hacking Types of Ethical Hackers Basic Terminologies Elements of Security 5 Phases of Hacking Profile of an Ethical Hacker Security Testing, Computer Crimes and Law History of Hacking & Famous Hackers
Chapter 3 Footprinting
Footprinting/Information Gathering Steps of Information Gathering Crawling and Mirroring of Websites Whois and Domain Registry Gathering Target Information Parallel Domain MX Entry Trace Route Archive Pages Banner Grabbing
Chapter 5 Scanning
Definition of Scanning Types of Scanning Diff b/w Port and Network Scanning Objectives and Benefits of Scanning TCP three way hands shake Various Classification of Scanning Fragments, UDP, ICMP, Reverse Ident, List & Idle, RPC, Window Scan, Ping Sweep Concept of War Dialer (History) OS Finger Printing and Types Active & Passive
Syskey Privilege Escalation Hiding Files Concept of Alternate Data Stream and Advantages Detecting ADS NTFS Streams countermeasures Keystroke Loggers and Types Software & Hardware Concept of Auditing, Logs and Covering Tracks Concept of Application Isolation
Reverse Connection in relation to Trojans Detecting a Trojan in a computer Anti-Trojan Software Tips to Avoid Trojan Infection Concept of Rootkit Effects and Types of Rootkit Countermeasures of Rootkit
Types of Proxy Servers Software Proxy, Proxy Websites, and Server Proxy Diff. between Transparent, Anonymous and Elite Proxies Anonymizers Socks Chain Proxy Http Tunnel Proxy Countermeasures of Proxy Packet Filtering Packet Filtering Devices and Approaches Stateless Packet Filtering Different Types of Filtering Based on IP Header, TCP, TCP/UDP, ICMP, ACK flags, Fragmentation and Packet Contents Filtering Suspicious Inbound Packets Stateful Packet Filtering Proxy Server Vs Packet Filtering
Chapter 12 Sniffers
Concept of Sniffing Types of Sniffing Active & Passive
ARP Poisoning Countermeasures of ARP Poisoning DNS Spoofing Changes in Host file for DNS Redirection Countermeasures of sniffing MAC Spoofing
Chapter 15 Steganography
Steganography o What is Steganography? o History o Steganography today o Steganography tools Steganalysis o What is Steganalysis? o Types of analysis o Identification of Steganographic files Steganalysis meets Cryptanalysis o Password Guessing o Cracking Steganography programs Forensics/Anti-Forensics Conclusions o Whats in the Future? o Other tools in the wild o References
Chapter 16 Cryptography
Concept of Cryptography Advantages and uses of Cryptography PKI (Public Key Infrastructure) Algorithms of encryption RSA, MD5, SHA, SSL, PGP, SSH, GAK Concept of Digital Signature Encryption Cracking Techniques Disk Encryption Cracking S/MIME encryption using idle CPU time Concept of Command Line Scriptor and Crypto Heaven, Cyphercalc CA (Certificate Authority)
Setting and detecting a wireless network Advantages and Disadvantages of wireless network Antennas, SSID, Access Point Positioning and Rogue Access Point Concept of Wired Equivalent Privacy (WEP) MAC Sniffing & AP Spoofing Terminology of Wi-Fi Access Denial-of-Service and MITM Attack in Wi-Fi Wireless Intrusion Detection System Tips to Secure Wireless Network
Types of Honeypots Uses of Honeypots Detecting Honeypot Honeynets Architecture of Honeynet Working process of Honeynet Types of Honeynet Honeywall CDROM
How to Conduct Vulnerability Assessment Vulnerability Analysis Stages Vulnerability Assessment Considerations Vulnerability Assessment Reports TimeLine and Penetration Attempts Vulnerability Assessment Tools
o Active o Passive TCP 3 Way Hand Shake Sequence Numbers Dangers Posed by Hijacking Countermeasure of Session Hijacking Protection Against Session Hijacking Countermeasure: IPSec
Issues Involved With Shellcode Writing Buffer Static Vs Dynamic Variables Stack Buffers, Data Region and Memory Process Regions About the Stack Need of Stack, Stack Region, Stack frame, Stack pointer, Procedure Call (Procedure Prolog) , Return Address (RET), Word Size and Buffer Overflows, Why do we get a segmentation violation and Segmentation Error Writing Windows Based Exploits EIP Register and ESP Metasploit Framework, msfconsole Development with Metasploit Need for Creating of Exploit Determining the Attack Vector Debugger Determine the offset & pattern create Where to place the payload?
Incident Eradication Process Incident Recovery Process Incident Follow up Process Incident Response Team CSIRT Services
Hijacking outgoing calls Hijacking outgoing calls with encryption enabled Hijacking incoming calls Hijacking incoming calls with encryption enabled Introduction of Cryptography, Fake BTS and Terminology Terminal and SIM Discuss about Mobile Execution Environment GSM Data, Signaling and Signaling Security SS7: Opening up to World, Waiting for disaster, Evolution and What to do Diff. between :o PSTN vs VOIP o VOIP vs SS7 GSM Network Elements and Architecture Home Location Register (HLR) and Authentication Center (AuC) Mobile Switching Center (MSC) Customer Care and Billing System Value-Added Services WAP Security Model, The WAP Gap and WTLS Security WAP: o No end-to-end Trust o Man-in-the-middle Introduction of third Generation of Wireless 3G Security Architecture and Security Model Diff. Between 3G vs GSM AKA Message Flow and Connection Establishment Overview of Ciphering and Integrity Interception and Its :o Definitions o Terminology o Logical Configuration o Concepts Circuit and Packet Data Event Records Discuss the Security of Interception Components of GSM Network Overview of Subscriber and its Identification Electronic Access to the SIM Extraction From A SIM
o Location Information File o Serial Number o Subscriber Identifier o Phone Number o Text Message Data o Status of Text Message Data o Threats to a SIM Data Equipments:o Generic Properties o Ms data o Threats to MS Data o Network and :o Network Operator Data o Call Data Records o Threats to Network Operator GSM Security Operation and Forensics Tools Overview of Cell Seizure Features Of Cell Seizure Advantages and Disadvantages of Cell Seizure Tool of Cell Seizure