8
044 42 63 42 42 9500053050 [email protected] Ethical Hacking Course A

Ethical Hacking Course Content Abhishek final- BTS

Embed Size (px)

Citation preview

Page 1: Ethical Hacking Course Content Abhishek final- BTS

044 42 63 42 42 9500053050

[email protected]

Ethical Hacking Course

A

Page 2: Ethical Hacking Course Content Abhishek final- BTS

044 42 63 42 42 9500053050

[email protected]

Ethical Hacking Course

Course Description

This is a penetration Testing & Information Security Training Program. The training provides you an intensive session which will empower you’re with knowledge in a simplified and easily graspable manner. In the training, we teach our students how hackers break into the systems, network, mobiles and website s as t make them aware of the possible loopholes and therefore, making them proficient in reverse-penetrating. By ding s, they are able to create a virtual wall between their data and the hackers. This training will enable you to carry up attacking as well as defensive methodologies which will help you and your organization to not only protect but also assess the safety and vulnerability rate.

Methods Durations N. of days Practical Theory Ratio

Training 40 Hours(Approx.) 22 Days 7:3

Training 40 Hours(approx.) 7 Days 7:3

Curse objectives At the end of this curse, participants will be able to: • Understand and perform Information Gathering Digital Foot Prints • Understand Email attacks and will be able to protect their email accounts as well as social

networking accounts from these attacks • Analyse Malwares from a computer system and remove them manually • Understand Web Application Attacks and will be able to patch them to produce a secure web

application. • Understand windows memory management and assembly language to perform basic Reverse

Engineering • Understand Enterprise Network Security Architecture • Understand Exploitation • Understand Wireless Security • Understand Security Architecture of mobile Platforms

Page 3: Ethical Hacking Course Content Abhishek final- BTS

044 42 63 42 42 9500053050

[email protected]

Target audience • This course can be attended by security officers, auditors, security professionals, website administrators, anyone who is concerned about the security of their network infrastructure and everyone who want to have a promising career in cyber security. Prerequisites • Basic knowledge of computers and internet technologies. Hands-on • The curse includes practical hands-n exercises that enable you to test your acquired skills during the training and understand its usage in a live environment

Page 4: Ethical Hacking Course Content Abhishek final- BTS

044 42 63 42 42 9500053050

[email protected]

Introduction to Information Security 1 Hour

Introduction Need of Information Security Ethical Side f Hacking Steganography Latest Test Cases Cyber Law & Indian IT Acts Conclusion

Basics of Network & Web Technology 4 Hours

Introduction IP Address NAT IP Subnets DHCP Server Ports DNS Proxy Servers Virtual Private Networks DNS Server SI Model Web Architecture Server Configuration HTML Basics PHP Basics

Information Gathering & Ft printing 1 Hour

Digital Foot Print Information Gathering Who Is Information Web Server Details Reverse IP Mapping People Search Tools to perform Digital Foot printing

Page 5: Ethical Hacking Course Content Abhishek final- BTS

044 42 63 42 42 9500053050

[email protected]

Email Security 3 Hours

Phishing Attacks - Desktop Phishing, Spear Phishing IDN Homograph Attack Social Engineering Fake Emails Identify Fake Emails Key Loggers Email Encryption Security Counter Measures

Goggle Hacking Database 1 Hour

Use Goggle to craft attacks Advanced operators of Goggle Find Vulnerabilities using Goggle Security Countermeasures

IDS, Firewalls & Honey Pots 2 Hours

Introduction t Firewalls Network Firewalls Web Application Firewalls Weakness in Firewalls Intrusion Detection Systems and weakness Intrusion Prevention Systems and weakness Honey Pts and Security Misconfiguration

Page 6: Ethical Hacking Course Content Abhishek final- BTS

044 42 63 42 42 9500053050

[email protected]

Web Application Vulnerability Assessment & Penetration Testing 15 Hours

Introduction t Web Architecture Web Security Generic Misconceptions Introduction to DBMS - MySQL, MS SQL, oracle, DB2 Introduction to SQL WASP Top 10 Attacks Sensitive Data Exposure Insecure Direct object References SQL Injections Authenticating Bypass Injection Blind Injections Error Based injection Union Based injection Stacked Query injection Time Based injection Cross Site Scripting (XSS) Broken authentication and Session Management CSRF Missing Function Level Access Control Invalidated Redirects and Forwards Security Misconfiguration Using Components with Known Vulnerabilities Brute Forcing Attack Heartbleed Attack Shell / Bash bug HTTP Response Splitting Denial f Service Attacks Vulnerability Analysis using Burp suite Arbitrary File Upload Applications to Automated VAPT

Page 7: Ethical Hacking Course Content Abhishek final- BTS

044 42 63 42 42 9500053050

[email protected]

System Hacking 4 Hours

• OS Login Bypass • Introduction to Authentication Mechanisms • Tools to Defeat Authentication Malware Illustration - Virus, Worms, Trojans Create

Virus • Create Trojans • Evade Antivirus & Firewalls • Scan System for Malicious Applications

Linux Basics 2 Hours

• Install and setup • Introduction to Linux based Pen testing OS • System Architecture • Network Configuration • Essential Commands

Network Attacks 2 Hours

• Introduction to Network Attacks Man in the Middle Attack • ARP Poisoning o SSL Stripping

Wireless Security 4 Hours

• Introduction to Wireless Technology • MAC Filtering • Packet Encryption • Packet Sniffing • Types of Authentication • Types of Attacks • ARP Replay Attack • Fake Authentication Attack • De-Authentication Attack • Security Countermeasures •

Page 8: Ethical Hacking Course Content Abhishek final- BTS

044 42 63 42 42 9500053050

[email protected]

Mobile Security 1 Hour

• Introduction to Mobile Platforms Security • Architecture of Mobile Platforms Introduction to VoIP • VoIP Calls from any number to any number - Fake Calls • Android Exploitation Framework

Total Duration 40 Hours