Sie sind auf Seite 1von 4

Ethical Hacking and Prevention

This course is meant for those professionals who are looking for comprehensive and total
knowledge in the network security domain. This is the only course which teaches both
hacking and prevention techniques. And in keeping with Zoom's standards, this course is
entirely hands on and real time oriented. And need we say, the instructors are network
security and intrusion specialists with several years of experience.

Course Contents

 Introduction to Ethical Hacking


Ethical
 Footprinting, Scanning, and Enumeration
Hacking and
 Hacking Web servers and Web applications
Prevention
 DoS, SQL injection, Buffer overflow attacks

 Cryptography

 Wireless hacking

 Linux Hacking

 Phishing

 Countermeasures

www.zoomgroup.com
Course Curriculum
Introduction to Ethical Hacking  Vulnerability Scanner tools
 What is Hacking  Finding more details about a vulnerability
 Who is a Hacker  What is a proxy server
 Skills of a Hacker  How does proxy server work
 Types of Hackers  Types of proxy servers
 Reasons for Hacking  How to find proxy servers
 Why do hackers use proxy servers
 Who are at the risk of Hacking attacks
 What is a TOR network
 Effects of Computer Hacking on an
organization  Why hackers prefer to use TOR
networks
 Network Security Challenges
 Elements of Information Security Hacking Web Servers & Web Applications
 The Security, Functionality & Usability  What is a web server
Triangle  Different webserver applications in use
 What is Ethical Hacking  Why are webservers hacked & its
 Why Ethical Hacking is Necessary consequences
 Scope & Limitations of Ethical Hacking  Directory traversal attacks
 What is Penetration Testing  Website defacement
 What is Vulnerability Auditing  Website password brute forcing
 How to defend against web server
Foot Printing hacking
 What is Foot Printing Session Hijacking
 Objectives of Foot Printing  What is session hijacking
 Finding a company’s details  Dangers of session hijacking attacks
 Finding a company’s domain name  Session hijacking techniques
 Finding a company’s Internal URLs  Cross-Site scripting attack
 Finding a company’s Public and Restricted  Session hijacking tools
URLs  How to defend against session hijacking
 Finding a company’s Server details
 Finding the details of domain registration SQL Injection
 Finding the range of IP Address  What is SQL Injection
 Finding the DNS information  Effects of SQL Injection attacks
 Finding the services running on the server
 Types of SQL Injection attacks
 SQL Injection detection tools
 Finding the location of servers
 Traceroute analysis Evading Firewalls, IDS & Honeypots
 Tracking e-mail communications  What is a Firewall
 What are the functions of a Firewall
Scanning  What is an IDS
 What is network scanning  How does an IDS work
 Objectives of network scanning  SPAN
 Finding the live hosts in a network  IDS tools
 SNMP Enumeration
 What is a honeypot
 Types of honeypots
 SMTP Enumeration
 Honeypot tools
 DNS Enumeration  Honeypot detection tools
 Finding open ports on a server
 Finding the services on a server Buffer Overflow
 OS fingerprinting  What is a buffer
 Understanding usage of buffers in
 Server Banner grabbing tools
applications
 What is a Vulnerability Scanning  What is buffer overflow
  Simple buffer overflow in C programming
 How to detect a buffer overflow
 How to defend against buffer overflow
attacks

www.zoomgroup.com
Denial of Service Phishing
 What is a DoS attack  What is Phishing
 What is a DDoS attack  How Phishing website is hosted
 Symptoms of a Dos attack  How victims are tricked to access
 DoS attack techniques Phishing websites
 What is a Botnet  How to differentiate a Phishing webpage
 Defending DoS attacks from the original webpage
 How to defend against Phishing attacks
Cryptography
 What is Cryptography Malware
 Types of cryptography  What is malware
 Cipher algorithms  Types of malware
 Public key infrastructure o Virus
 What is a Hash  What is a virus program
 Cryptography attacks  What are the properties of a
virus program
System Hacking  How does a computer get
 What is system Hacking infected by virus
 Goals of System Hacking  Types of virus
 Password Cracking  Virus making tools
 Password complexity  How to defend against virus
 Finding the default passwords of network attacks
devices and softwares o Worm
 Password cracking methods  What is a worm program
o Online password cracking  How worms are different from
 Man-in-the-middle attack virus
 Password guessing  Trojan
o Offline password cracking  What is a Trojan horse
 Brute force cracking  How does a Trojan operate
 Dictionary based cracking  Types of Trojans
 Hybrid attack
 Identifying Trojan infections
 USB password stealers
 How to defend against Trojans
 Elcomsoft Distributed password recovery
tools
o Spyware
 Active password changer
 What is a spyware
 What is a keylogger
 Types of spywares
 How to deploy a keylogger to a remote pc  How to defend against spyware
 How to defend against a keylogger  Rootkits
Sniffers  What is a Rootkit
 What is a sniffer
 Types of Rootkits
 How does Rootkit operate
 How sniffer works
 How to defend against Rootkits
 Types of sniffing
o Active sniffing
Kali Linux
o Passive Sniffing
 What is promiscuous mode  What is Kali Linux
 How to put a PC into promiscuous mode  How Kali Linux is different from other
 What is ARP Linux distributions
 ARP poison attack  What are the uses of Kali Linux
 Threats of ARP poison attack  Tools for Footprinting, Scanning &
 How MAC spoofing works Sniffing
 MAC Flooding  What is Metasploit framework
 What is a CAM Table  Using Metasploit framework to attack
 How to defend against MAC Spoofing Wiindows machines
attacks  Using Metasploit framework to attack
 How to defend against Sniffers in network Android devices

www.zoomgroup.com
Wireless Hacking IDS / IPS
 Types of wireless networks o What is an IDS
o What is a IPS
 Wi-Fi usage statistics o Difference between IDS & IPS
 Finding a Wi-Fi network o Placement of IDS in the
 Types of Wi-Fi authentications Network
o Configuring an IDS in the
o Using a centralized authentication Network
server o Placement of IPS in the
o Using local authentication Network
 Types of Wi-Fi encryption methods o Configuring an IPS in the
o WEP Network
o WPA  UTM / Next-Generation Firewall
o WPA2 o What is a UTM
o Features of UTM
 How does WEP work
o Difference between a Firewall &
 Weakness of WEP encryption a UTM
 How does WPA work o Placement of UTM in the
Network
 How does WPA2 work o Configuring a UTM in the
 Hardware and software required to crack Network
Wi-Fi networks o Monitoring attacks using UTM
 How to crack WEP encryption o Configuring IPS module in UTM
to detect and stop attacks
 How to crack WPA encryption
 How to crack WPA2 encryption Counter Measure Techniques for Local
 How to defend against Wi-Fi cracking Systems
attacks  Identifying the Vulnerabilities of a system
 Understanding the Vulnerabilities of a
system
o CVE ID
Penetration Testing
o Bugtraq ID
 What is Penetration Testing  Patch Management
 Types of Penetration Testing o Identifying the patch for a
 What is to be tested Vulnerability
o Downloading the Patch
o Testing the network devices for mis- o Testing the patch for stability in
configuration test environment
o Testing the servers and hosting o Deploying the patch to Live
applications for mis-configuration Network
o Testing the servers and hosting  Finding the missing updates in an
applications for vulnerabilities Operating System
o Testing wireless networks o Microsoft Baseline Security
o Testing for Denial of Service attacks Analyzer
o Belarc Advisor

Counter Measure Techniques for Network level Counter Measure Techniques for Malware
attacks Attacks
 Types of Firewall  Scanning systems for Malware infections
o Packet Filtering Firewall  Types of anti-malwares
o Circuit-Level Gateway Firewall o Anti-Virus
o Application-Level Firewall o Anti-Worm
o Stateful Multilayer Inspection o Anti-Trojan
Firewall o Anti-Rootkit
o Internet Security Suites
o Limitations of a Firewall
 HIDS

 HIPS

www.zoomgroup.com

Das könnte Ihnen auch gefallen