|
Ethical Hacking with Cyber Security & Computer Forensics Certification
Session 1
- A: Introduction to Ethical Hacking
- B: Ethics and the Hacker
- C: Hacking Legalities
- D: Footprinting Concepts
- E: Web Footprinting Tools
- F: Local Foot printing Tools
- G: Scanning for Gold
Session 2
- A: Mastering Scanning Tools
- B: Enumeration
- C: Passwords
- D: Password Cracking Tools
- E: Ownership Privileges
- F: Trojan Horses
- G: Sniffers
Session 3
- A: ARP, MAC, and DNS
- B: DoS Attacks
- C: Social Engineering
- D: Advanced Social Engineering
- E: Session Hijacking
- F: Web Servers
- G: Hacking Web Servers
- H: Web Applications
- I: Cracking Web Passwords
Session 4
- A: SQL Injections
- B: SQL Attacks
- C: Wireless Vulnerabilities
- D: WEP Attacks
- E: WPA and EAP
- F: Viruses and Worms
- G: Physical Security Policies
Session 5
- A: Implementing Physical Security
- B: Linux
- C: Compiling Linux
- D: Intrusion Monitoring Systems
- E: Evading IMS
- F: Buffer Overflows
Session 6
- A: Cryptography
- B: Symmetric Cryptography
- C: Multi-Hat Hacking
- D: Computer Forensics
- E: Hack Prevention
- F: Security Policies
Session 7: Research and Live Hacking
- A: SIM cloning a Ethical way
- B: Credit Card or ATM card cloning possibilities
- C: How to create a secure server with CERT std
- D: Virus coding
|
|
|
|
|
|
|
|
|