Course Curriculum
Learning Objective – Learn the issues, including plaguing the information security world, ethical hacking, information security controls, laws, and standards.
Topic:
- Information Security Overview
- Information Security Threats and Attack Vectors
- Penetration Testing Concept
- Hacking Concepts
- Ethical Hacking Concepts
- Information Security Controls
- Information Security Laws and Standards
Learning Objective – To perform footprinting and reconnaissance using the latest footprinting techniques and tools as a critical pre-attack phase required in ethical hacking.
Topic:
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Web Services
- DNS Footprinting
- Network Footprinting
- Footprinting Tools
Learning Objective – Perform network scanning techniques and scanning countermeasures.
Topic:
- Network Scanning Concepts
- Scanning Techniques
- Scanning Beyond IDS and Firewall
- Banner Grabbing
- Draw Network Diagrams
Learning Objective – Learning about enumeration techniques and enumeration countermeasures.
Topic:
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- Enumeration Countermeasures
Learning Objective – Vulnerability analysis is used to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
Topic:
- Vulnerability Assessment Concepts
- Vulnerability Assessment Solutions
- Vulnerability Scoring Systems
- Vulnerability Assessment Tools
Learning Objective – Learn about System Hacking methodology and cover tracks to discover system and network vulnerabilities.
Topic:
- System Hacking Concepts
- Cracking Passwords
- Executing Applications
- Penetration Testing
Learning Objective – To study the various types of malware (Virus, Worms, Trojan, etc.), malware analysis, system auditing for malware attacks, and countermeasures.
Topic:
- Malware Concepts
- Trojan Concepts
- Malware Analysis
- Countermeasures
Learning Objective – Find out about packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Topic:
- Sniffing Concepts
- Sniffing Technique: MAC Attacks
- Sniffing Technique: DHCP Attacks
- Sniffing Technique: Spoofing Attacks
Learning Objective – Learning about Social Engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and suggest social engineering countermeasures.
Topic:
- Social Engineering Concepts
- Social Engineering Techniques
- Identity Theft
Learning Objective – Acquire knowledge about DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Topic:
- DoS/DDoS Concepts
- DoS/DDoS Attack Technique
- DoS/DDoS Attack Tools
- Countermeasures
Learning Objective – To learn about session hijacking techniques implemented by hackers and to discover network-level session management, authentication, authorization, cryptographic weakness, and countermeasures.
Topic:
- Session Hijacking Concepts
- Application Level Session Hijacking
- Session Hijacking Tools
- Countermeasures
Learning Objective – Learning how to avoid web server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.
Topic:
- Web Server Concepts
- Web Server Attacks
- Patch Management
Learning Objective –Study in detail about wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Topic:
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
Learning Objective – Learning about countering threats to IoT and OT platforms and learning how to defend IoT and OT devices securely.
Topic:
- IoT Concepts
- IoT Attack
- IoT Hacking Methodology
Learning Objective – Acquiring knowledge about Cloud Computing concepts (Container technology, serverless computing), various threats and attacks, and security techniques and tools.
Topic:
- Cloud Computing Concepts
- Cloud Computing Attacks
- Cloud Computing Threats
Learning Objective – Finding out more about cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptography tools.
Topic:
- Cryptography Concepts
- Encryption Algorithms
- Cryptography Tools
Productivity Hacks to Get More Done in 2018
— 28 February 2017
- Facebook News Feed Eradicator (free chrome extension) Stay focused by removing your Facebook newsfeed and replacing it with an inspirational quote. Disable the tool anytime you want to see what friends are up to!
- Hide My Inbox (free chrome extension for Gmail) Stay focused by hiding your inbox. Click "show your inbox" at a scheduled time and batch processs everything one go.
- Habitica (free mobile + web app) Gamify your to do list. Treat your life like a game and earn gold goins for getting stuff done!