ppt-on-ethical-hacking-1-638

Ethical Hacking Fundamentals
Considering the effects of hacking
  • Reviewing the elements of information security.
  • The security, functionality and usability triangle.
  • Ethical Hacking isn’t hacking while it is used to prevent yourself from hacks and to be stay safe.
Outlining the methods of hackers:-
  • Reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Covering tracks
  • Identifying attack types: operating system, application level, shrink-wrap code and misconfiguration
Functions of an ethical hacker
  • Conducting vulnerability research
  • Identifying elements of information warfare
Applying Covert Techniques to Scan and Attack a Network
Foot printing and reconnaissance
  • Objectives and methods of foot-printing
  • Searching for information with Google Hacking
  • Employing foot-printing countermeasures
Scanning networks
  • Adopting multiple scanning techniques
  • Identifying IDS-evasion and IP-fragmentation tools
  • Leveraging vulnerability scanning tools
  • Applying IP spoofing detection
Examining enumeration techniques
  • Enumerating user accounts using default passwords
  • Simple Network Management Protocol (SNMP) enumeration
AnalysingSystem Risks and Weaknesses to Apply Countermeasures
System hacking
  • CEH Hacking Methodology (CHM)
  • Cracking passwords and escalating privileges
  • Defending against password cracking and keyloggers
  • Hiding information with stegnography
Uncovering Trojans and backdoors
  • Injecting a Trojan into a host
  • Analysing Trojan activity
Dissecting viruses, worms and sniffers
  • Distributing malware on the web
  • Recognizing key indicators of a virus attack
  • Analysing worms and malware
Social engineering and Denial-of-Service (DoS)
  • Targets, intrusion tactics and strategies for prevention
  • Mitigating the risks of social networking to networks
  • Recognizing symptoms and techniques of a DoS attack
  • Implementing tools to defend against DoS attacks
Assessing and Preventing Gaps in a Network Infrastructure
Hacking web applications and wireless networks
  • Cross-Site Scripting (XSS) and web application DoS attacks
  • Defending against SQL injection
  • Implementing a man-in-the-middle attack
Hijacking sessions and web servers
  • Spoofing a site to steal credentials
  • Preventing hijacking by implementing countermeasures
  • Leveraging Metasploit in an attack
Evading IDS, firewalls and honeypots
  • Assessing various types of Intrusion Detection Systems (IDS) and tools
  • Bypassing firewalls and accessing blocked sites
Buffer overflow and cryptography
  • Exploiting input validation failures
  • Defending against memory corruption attacks
Performing Penetration Testing
  • Performing security and vulnerability assessments
  • Determining testing points and locations
  • Announced vs. unannounced testing

If you are looking for Ethical Hacking training institute in Lucknow , Kanpur , Delhi , Rai Bareily , Gonda , Basti , Gorakhpur , Hardoi , Gurgaon , Noida , Greater Noida , Rajasthan , Jaipur , Jodhpur , Fatehpur , Meerut , Jhansi , Bhilai , Guna , Indore , Himachal Pradesh , Kashipur , rudrapur , Uttarakhand , Pithoragarh , Ganai Gangoli , Nainital , Shimla , Jammu , Pathankot , Nepal , Chandigarh , Punjab , Madhya Pradesh , guwahati , us , uk , usa , dubai , united arab emirates , Europe , Australia , Bangladesh , Colombo , Ukraine , Nigeria , Africa , bihar , patna , chhatisgarh , India , UttarPradesh , Banaras , Varanasi
Call Us Now: 8090211110 , 9651263333 , 7897294444.