Ethical Hacking
Ethical Hacking
Fundamentals and key issues in information security, including the basics of ethical hacking, information
security controls, relevant laws, and standard procedures.
How to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack
phase of ethical hacking
Scanning Networks
Vulnerability Analysis
How to identify security loopholes in a target organization’s network, communication infrastructure, and
end systems. Different types of vulnerability assessment and vulnerability assessment tools are also
included.
System Hacking
Various system hacking methodologies used to discover system and network vulnerabilities, including
steganography, steganalysis attacks, and how to cover tracks, different types of malware (Trojan,
viruses,worms, etc.), malware analysis procedures, and malware countermeasures.
Sniffing
Packet sniffing techniques and their uses for discovering network vulnerabilities, countermeasures to
defend against sniffing attacks, Various session-hijacking techniques and associated countermeasures.
Social Engineering
Social engineering concepts and techniques, including how to identify theft attempts, audit human-level
vulnerabilities, and suggest social engineering countermeasures.
Denial-of-Service
Different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to
audit a target and devise DoS and DDoS countermeasures and protections.
Firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a
network perimeter for weaknesses; and countermeasures.
Different types of encryption, threats, hacking methodologies, hacking tools, security tools, and
countermeasures for wireless networks.
Mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security
guidelines, and security tools.
Cryptography
Encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk
encryption, cryptography attacks, and cryptanalysis tools.