0% found this document useful (0 votes)
41 views

Ethical Hacking

Uploaded by

Sahara Kerala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

Ethical Hacking

Uploaded by

Sahara Kerala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 2

Introduction to Ethical Hacking

Fundamentals and key issues in information security, including the basics of ethical hacking, information
security controls, relevant laws, and standard procedures.

Footprinting and Reconnaissance

How to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack
phase of ethical hacking

Scanning Networks

Different network scanning techniques and countermeasures, various enumeration techniques,exploits


and associated countermeasures.

Vulnerability Analysis

How to identify security loopholes in a target organization’s network, communication infrastructure, and
end systems. Different types of vulnerability assessment and vulnerability assessment tools are also
included.

System Hacking

Various system hacking methodologies used to discover system and network vulnerabilities, including
steganography, steganalysis attacks, and how to cover tracks, different types of malware (Trojan,
viruses,worms, etc.), malware analysis procedures, and malware countermeasures.

Sniffing

Packet sniffing techniques and their uses for discovering network vulnerabilities, countermeasures to
defend against sniffing attacks, Various session-hijacking techniques and associated countermeasures.

Social Engineering

Social engineering concepts and techniques, including how to identify theft attempts, audit human-level
vulnerabilities, and suggest social engineering countermeasures.

Denial-of-Service

Different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to
audit a target and devise DoS and DDoS countermeasures and protections.

Evading IDS, Firewalls, and Honeypots

Firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a
network perimeter for weaknesses; and countermeasures.

Hacking Web Servers & Web Applications


Web attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server ,
web application attacks, SQL injection attack techniques and countermeasures.

Hacking Wireless Networks

Different types of encryption, threats, hacking methodologies, hacking tools, security tools, and
countermeasures for wireless networks.

Hacking Mobile Platforms

Mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security
guidelines, and security tools.

Cryptography

Encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk
encryption, cryptography attacks, and cryptanalysis tools.

You might also like