Course Modules:
Networking Concepts
- How does internet work.
- What is network ?
- Countermeasures of network.
- What is IP and? types of IP ?
- What is Mac ?
- What is Cookie and Cache ? .
- Domain Name System
- DNS Poisoning
- Name Server
- Electronic Mail
- Architecture and Services
- Mail Access Protocols
- Introduction of Ports
- Introduction to Web Browser
- Detail Study on Buffer or Packets
- Detail Study on Internet and Intranet
- Detail Study on Firewall
- Concept of Routing and Switching
Operating System Concepts
- Introduction to Operating System
- Types of Operating System
- Bootstrapping Technology
- Understanding Windows
- Understanding Tokens
- Impersonation Tokens
- Local and Domain Escalation
- Process Scheduling
- Concept of ACL
Introduction to Ethical Hacking
- What is Ethical Hacking
- Types of Hackers
- Who is a Hacker
- Security Challenges
- Scanning
- Skills required for an Ethical Hacker
- Types of Attacks
- What do Ethical Hackers Do
- Vulnerability Research
- Effects of Hacking
- How can Hacking be Ethical
- Types of Data Stolen from the organization
- What is Penetration Testing
- Penetration Testing Methodology
Footprinting
- Footprinting Terminologies
- What is Footprinting
- Methods of Footprinting
- Benefits of Footprinting
- People Search
- Who-is-lookup
- DNS Lookup
- Analyzing Email Headers
- Extracting DNs Information
- Traceroute
- Mirroring Websites
- Finding Vulnerable Web-Sites
- Extracting Website Informations
- Tracking Users
- Tracking Emails Communications
- Tracking Mobile Communications
- Mobile Communications Countermeasures
- Additional Footprinting Tools
- Complete Study on CCAS Tracing Tools
Google Hacking
- What a hacker Do using Google Hacking
- Footprinting using Google Hacking Technique
- Google Advance Search Operators
- Google Hacking Tools
- Error Message Queries
Scanning Network
- Network Scanning
- Types of Scanning
- Three Way Handshake
- TCP Communication Flags
- Hping Commands
- Scanning Techniques
- Searching Vulnerable Systems
- Complete Study on All CCAS Scanning Tools
- Operating System Fingerprinting
- Scanning Countermeasures
- Securing Network
- Complete Study on Banner Grabbing
- Vulnerability Scanning
- Proxy Servers
- Use of Proxies
- Working of Multi Proxies
- Proxy Tools
- HTTP Tunnelling Technologies
- SSH Tunnelling
- IP Spoofing Detection Technology
- IP Spoofing Countermeasures
- Anonymizers
- Types of Anonymizers
- Anonymizers Tools
System Hacking & Password Breaking
- System Hacking: Goals
- CCAS Hacking Methodology
- Password Cracking
- Password Complexity
- Password Cracking Techniques
- Types of Password Attacks
- Microsoft Authentication
- How Hash Passwords are Stored in Windows SAM?
- PWdump7 and Fgdump
- LazeSoft
- ?Ophcrack
- Cain & Abel
- Detail Study on Password Cracking Tools
- Privilege Escalation
- Escalation of Privileges
- Keylogger
- Types of Keystroke Loggers
- Detail Study on Keyloggers and Spywares
- AntiKeyloggers
- Spyware
- Types of Spyware
- USB Spyware
- Audio Spyware
- Email or internet Spyware
- Antispyware
- RootKits
- Types Of RootKits
- Details Study on Spyware or RootKits
- AntiRootkits
- Covering Tracks?
Steganography & Cryptography
- What is Steganography
- Steganography Techniques
- How Steganography Works
- Types of? Steganography
- Methods of Steganography
- Steganography Detection Tools
- Cryptography
- Types of Cryptography
- Cryptography Techniques
- What is SSH
- Cryptography Tools
- Cryptography Attacks
- Code Breaking Methodologies
Trojans and Backdoors
- Introductions to Trojans
- Reasons of Trojans
- How to use Trojans
- How Systems get infected? by Trojans
- Types of Trojans
- Designing Trojans
- Removing? Trojans
- Detail study on Designing and use Trojans
- Detections Trojans
- How to create Backdoors
- Uninstalling Trojans remotely
- Purpose of Backdoors
- Study on Anti-Trojan Sofware
- Backdoor Countermeasures
- Trojans Countermeasures
Viruses & Worms
- Introduction to Viruses
- Stages of Viruses Life
- Working Of Viruses
- Why Do People Create Computer Viruses
- Indications of Viruses attack
- How does a Computer get infected by Viruses
- Viruses Analysis
- Types of Viruses
- Desiging Viruses
- Computer Worms
- Worm Maker
- Worm Analysis
- Anti-Virus Tools
- Virus detection methods
- Virus & Worms Countermeasures
Sniffers & Phishing
- Sniffing Threats
- How a Sniffer Works
- What is Address Resolution Protocol (ARP)
- Types of Sniffing
- How DHCP works
- Spoofing Attacks
- DNS Poisoning
- Sniffing Tool : WireShark
- Sniffing Prevention Techniques
- How to Detect Sniffing
Social Engineering
- What is Social Engineering
- Behaviors Vulnerable to attacks
- Why is Social Engineering Effective
- Warning Signs of an Attacks
- Phases in a Social Engineering attack
- Impact on the Organization
- Command Injection Attacks
- Common Targets of Social Engineering
- Types of Social Engineering
- Social Engineering Through Impersonation On Social networking Sites
- Risks of Social Networking to Corporate Networks
- Social Engineering Countermeasures
Denial of Service
- What is Denial of Service Attack
- What is Distributed Denial Of Service Attacks
- Symptoms of DoS atrack
- Internet Relay Chat (IRC)
- DoS Attack Techniques
- Botnet
- DoS/DDoS Countermeasures
- Detail Study on DoS attack Tools
- Detection Techniques
Session Hacking
- What is Session Hijacking
- Key Session Hijacking Techniques
- Session Hijacking Process
- Types of Session Hijacking
- Session Hijacking Tools
- Countermeasures
- Methods to Prevent Session Hijacking
- Defending Against Session Hijacking Attacks
Hacking Web Applications
- Web Application Security Statistics
- Introduction to Web Applications
- Web Application Components
- How Web Applications Work?
- Web Application Architecture
- Injection Flaws
- What is LDAP Injection?
- How LDAP Injection Works?
- Cross-Site Scripting (XSS) Attacks
- How XSS Attacks Work?
- Cross-Site Scripting Attack Scenario: Attack via Email
- XSS Example
- XSS Cheat Sheet
- Cross-Site Request Forgery (CSRF) Attack
- How CSRF Attacks Work?
- Web Application Denial-of-Service (DoS) Attack
- Buffer Overflow Attacks
- Cookie/Session Poisoning
- How Cookie Poisoning Works?
- Hacking Web Servers
- Username Enumeration
- Password Attacks: Password Functionality Exploits
- Password Attacks: Password Guessing
- Password Attacks: Brute-forcing
- Session Attacks: Session ID Prediction/ Brute-forcing
- Cookie Exploitation: Cookie Poisoning
- Encoding Schemes
- How to Defend Against SQL Injection Attacks?
- How to Defend Against Command Injection Flaws?
- How to Defend Against XSS Attacks?
- How to Defend Against DoS Attack?
- How to Defend Against Web Services Attack?
- Web Application Countermeasures
- Web Application Firewall
SQL Injection
- What is SQL Injection?
- SQL Injection Attacks
- How Web Applications Work?
- SQL Injection Detection
- Types of SQL Injection
- What is Blind SQL Injection?
- SQL Injection Methodology
- Information Gathering
- Password Grabbing
- Grabbing SQL Server Hashes
- Extracting SQL Hashes (In a Single Statement)
- SQL Injection Tools
- How to Defend Against SQL Injection Attacks?
- How to Defend Against SQL Injection Attacks: Use Type-Safe SQL Parameters
Miscellaneous
- Wifi Hacking – WPA2
- Creating fake access point
- Android Phone hacking
- Deleted Data recovery
- Detail study on android phone pattern breaking
- Android Phone Rooting
- MITM
- Whatsapp Data Recovery
- Cyber Crime Investigation
- Introduction to Cyber Crime Investigation.
- Types of Cyber Crimes.
- Report Cyber Crimes.
- Investigating Emails (Email Tracing)
- Online email header analysis.
- Investigating Phishing Cases.
- Investigating Data Theft Cases.
- Investigating Orkut Profile Impersonation Cases.
- Cyber Law & IT Act, 2000 / 2008.
To Download Complete Syallbus Click Here
More Industrial Training Courses Click here
0.0
0 total
5
4
3
2
1