Ethical Hacking Fundamentals
Considering the effects of hacking
- Reviewing the elements of information security.
- The security, functionality and usability triangle.
- Ethical Hacking isn’t hacking while it is used to prevent yourself from hacks and to be stay safe.
Outlining the methods of hackers:-
- Reconnaissance
- Scanning
- Gaining access
- Maintaining access
- Covering tracks
- Identifying attack types: operating system, application level, shrink-wrap code and misconfiguration
Functions of an ethical hacker
- Conducting vulnerability research
- Identifying elements of information warfare
Applying Covert Techniques to Scan and Attack a Network
Foot printing and reconnaissance
- Objectives and methods of foot-printing
- Searching for information with Google Hacking
- Employing foot-printing countermeasures
Scanning networks
- Adopting multiple scanning techniques
- Identifying IDS-evasion and IP-fragmentation tools
- Leveraging vulnerability scanning tools
- Applying IP spoofing detection
Examining enumeration techniques
- Enumerating user accounts using default passwords
- Simple Network Management Protocol (SNMP) enumeration
AnalysingSystem Risks and Weaknesses to Apply Countermeasures
System hacking
- CEH Hacking Methodology (CHM)
- Cracking passwords and escalating privileges
- Defending against password cracking and keyloggers
- Hiding information with stegnography
Uncovering Trojans and backdoors
- Injecting a Trojan into a host
- Analysing Trojan activity
Dissecting viruses, worms and sniffers
- Distributing malware on the web
- Recognizing key indicators of a virus attack
- Analysing worms and malware
Social engineering and Denial-of-Service (DoS)
- Targets, intrusion tactics and strategies for prevention
- Mitigating the risks of social networking to networks
- Recognizing symptoms and techniques of a DoS attack
- Implementing tools to defend against DoS attacks
Assessing and Preventing Gaps in a Network Infrastructure
Hacking web applications and wireless networks
- Cross-Site Scripting (XSS) and web application DoS attacks
- Defending against SQL injection
- Implementing a man-in-the-middle attack
Hijacking sessions and web servers
- Spoofing a site to steal credentials
- Preventing hijacking by implementing countermeasures
- Leveraging Metasploit in an attack
Evading IDS, firewalls and honeypots
- Assessing various types of Intrusion Detection Systems (IDS) and tools
- Bypassing firewalls and accessing blocked sites
Buffer overflow and cryptography
- Exploiting input validation failures
- Defending against memory corruption attacks
Performing Penetration Testing
- Performing security and vulnerability assessments
- Determining testing points and locations
- Announced vs. unannounced testing
If you are looking for Ethical Hacking training institute in Lucknow , Kanpur , Delhi , Rai Bareily , Gonda , Basti , Gorakhpur , Hardoi , Gurgaon , Noida , Greater Noida , Rajasthan , Jaipur , Jodhpur , Fatehpur , Meerut , Jhansi , Bhilai , Guna , Indore , Himachal Pradesh , Kashipur , rudrapur , Uttarakhand , Pithoragarh , Ganai Gangoli , Nainital , Shimla , Jammu , Pathankot , Nepal , Chandigarh , Punjab , Madhya Pradesh , guwahati , us , uk , usa , dubai , united arab emirates , Europe , Australia , Bangladesh , Colombo , Ukraine , Nigeria , Africa , bihar , patna , chhatisgarh , India , UttarPradesh , Banaras , Varanasi
Call Us Now: 8090211110 , 9651263333 , 7897294444.