Certified-Ethical-Hacking_Networking_Linux_Course-Content_Asquare-Technologies
Certified-Ethical-Hacking_Networking_Linux_Course-Content_Asquare-Technologies
Pre-Requisites
Basic understanding of network essentials and core concepts, including server and
network components
exam.
1.1 Internet is an Integral Part of Business and Personal Life – What Happens Online in 60
Seconds
www.asquaretechnologiesweb.com
1.8 Types of Attacks on a System
1.11Who is a Hacker?
Concepts of Footprinting
www.asquaretechnologiesweb.com
Footprinting Using Search Engines
2.5 Information Gathering Using Google Advanced Search and Image Search
2.10 People Search on Social Networking Sites and People Search Services
Footprinting of Websites
www.asquaretechnologiesweb.com
2.23 Extracting Metadata of Public Documents
Footprinting of Emails
Competitive Intelligence
2.29 Competitive Intelligence – When When did this company begin? How did it develop?
2.31 Competitive Intelligence – What do expert opinions say about the company?
DNS Footprinting
Network Footprinting
www.asquaretechnologiesweb.com
2.40 Locate the Network Range
2.41 Traceroute
2.45 Collect Information Using Eavesdropping, Shoulder Surfing, and Dumpster Diving
2.46 Maltego
2.47 Recon-ng
2.48 FOCA
2.49 Recon-Dog
2.50 OSRFramework
Countermeasures
www.asquaretechnologiesweb.com
3.4 Creating Custom Packet Using TCP Flags
3.6 Nmap
Banner Grabbing
Network Diagrams
www.asquaretechnologiesweb.com
Module 04: Basics of Enumeration(10 Hours)
Concepts of Enumeration
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP Enumeration
www.asquaretechnologiesweb.com
SMTP and DNS Enumeration
www.asquaretechnologiesweb.com
5.15 National Vulnerability Database (NVD)
Cracking Passwords
www.asquaretechnologiesweb.com
6.13 How to Defend against Password Cracking
Escalating Privileges
Executing Applications
6.23 Keylogger
6.24 Spyware
Hiding Files
6.27 Rootkits
Covering Tracks
www.asquaretechnologiesweb.com
6.33 Manually Clearing Event Logs
Penetration Testing
Concepts of Trojans
7.10 Wrappers
www.asquaretechnologiesweb.com
7.12 How Attackers Deploy a Trojan
7.23 Ransomware
Malware Analysis
www.asquaretechnologiesweb.com
Countermeasures
Concepts of Sniffing
8.8 Wiretapping
www.asquaretechnologiesweb.com
8.16 How DHCP Works
8.20 How to Defend Against DHCP Starvation and Rogue Server Attack
8.26 Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
www.asquaretechnologiesweb.com
8.35 Sniffing Tool: Wireshark
Countermeasures
Insider Threats
www.asquaretechnologiesweb.com
9.9 Social Engineering Through Impersonation on Social Networking Sites
Identity Theft
Countermeasures
DoS/DDoS Concepts
www.asquaretechnologiesweb.com
10.3 Basic Categories of DoS/DDoS Attack Vectors
Botnets
10.15 Botnet
www.asquaretechnologiesweb.com
10.25 DoS/DDoS Attack Tools
Countermeasures
www.asquaretechnologiesweb.com
Application Level Session Hijacking
11.9 Compromising Session IDs using Sniffing and Predicting Session Token
11.13 Compromising Session IDs Using Client-side Attacks: Cross-site Script Attack
11.14 Compromising Session IDs Using Client-side Attacks: Cross-site Request Forgery Attack
Countermeasures
www.asquaretechnologiesweb.com
Module 12: How to Evade IDS, Firewalls, and Honeypots(10 Hours)
12.2 Firewall
12.3 Honeypot
12.5 Firewalls
IDS Evasion
Detecting Honeypots
www.asquaretechnologiesweb.com
Penetration Testing
www.asquaretechnologiesweb.com
13.20 Information Gathering
13.27 Metasploit
Countermeasures
13.29 Place Web Servers in Separate Secure Server Security Segment on Network
13.30 Countermeasures
Hacking Methodology
www.asquaretechnologiesweb.com
14.9 Attack Web Servers
Countermeasures
www.asquaretechnologiesweb.com
15.11 SQL Injection Methodology
Countermeasures
Wireless Concepts
Wireless Encryption
Wireless Threats
www.asquaretechnologiesweb.com
Wireless Hacking Methodology
Countermeasures
www.asquaretechnologiesweb.com
17.4 How a Hacker Can Profit from Mobile when Successfully Compromised
Hacking Android OS
17.11 Android OS
17.16 Launching DoS Attack using Low Orbit Ion Cannon (LOIC)
Mobile Spyware
www.asquaretechnologiesweb.com
Module 18: Basics of IoT Hacking (10 Hours)
IoT Concepts
Attacks on IoT
Countermeasures
www.asquaretechnologiesweb.com
Module 19: Basics of Cloud Computing(10 Hours)
Cryptography Concepts
www.asquaretechnologiesweb.com
20.1 Cryptography
Encryption Algorithms
20.3 Ciphers
Cryptography Tools
Email Encryption
Countermeasures
www.asquaretechnologiesweb.com
Duration : 2 Months (Approx)
Network Fundamentals (15Hours)
Explaining the roles and functions of components like routers, switches, access
points, servers, endpoints, firewalls, IPS, and controllers
Describing the properties of network architecture including 2-tier, 3-tier, spine-leaf,
WAN, SOHO, cloud and on-premises topology
Comparing types of cables - copper, single-mode, fibre, multimode fibre, etc.
Physical interface comparison with respect to point-to-point and ethernet shared
media connections. PoE Concepts are also discussed in this chapter
Identifying interface and cable problems such as errors, collisions, speed, and
mismatch duplex
Comparing UDP to TCP
Configuring and verifying IPv4 addresses and subnetting
Demonstrating the importance of private IPv4 address
Configuring and verifying of IPv6 prefix and address
Comparing IPv6 address types, including link local, unique local, global unicast,
anycast, multicast, modified EUI 64
Describing wireless principles including WiFi channels (non-overlapping), SSID, RF,
and encryption
Explaining virtual machines
Describing switching concepts, frame switching, frame flooding, MAC learning,
ageing, and MAC address table
IP Services (10hours)
Configuring and verifying NAT through pools and static
Configuring and verifying NTP in a client and server setting
Explaining the function of DNS and DHCP
Syslog features such as levels and facilities description
www.asquaretechnologiesweb.com
Configuring and verifying relay and DHCP Client
SSH method for configuring network devices
Explaining TFTP/FTP capabilities and roles through SSH
www.asquaretechnologiesweb.com
Linux Course Curriculum (40 Hours)
Introduction to Linux
Topics:
What is Linux
History of Linux
Features of Linux
Components of a Linux OS
Types of Kernel
Shell
Programming in Linux
Linux Distribution
Software Licencing
Shell Scripting
www.asquaretechnologiesweb.com
Linux Course Curriculum (40 Hours)
Introduction to Linux
Topics:
What is Linux
History of Linux
Features of Linux
Components of a Linux OS
Types of Kernel
Shell
Programming in Linux
Linux Distribution
Software Licencing
Shell Scripting
www.asquaretechnologiesweb.com
Initialization of Linux
User Administration
Boot and Package Management
Networking
Linux Overview and Scripting
Linux for software development
Security Administration, Shell Script and Virtualization
www.asquaretechnologiesweb.com
www.asquaretechnologiesweb.com