Ethical Hacking with Cyber Security & Computer Forensics Certification

Session 1

  • A: Introduction to Ethical Hacking
  • B: Ethics and the Hacker
  • C: Hacking Legalities
  • D: Footprinting Concepts
  • E: Web Footprinting Tools
  • F: Local Foot printing Tools
  • G: Scanning for Gold

Session 2

  • A: Mastering Scanning Tools
  • B: Enumeration
  • C: Passwords
  • D: Password Cracking Tools
  • E: Ownership Privileges
  • F: Trojan Horses
  • G: Sniffers

Session 3

  • A: ARP, MAC, and DNS
  • B: DoS Attacks
  • C: Social Engineering
  • D: Advanced Social Engineering
  • E: Session Hijacking
  • F: Web Servers
  • G: Hacking Web Servers
  • H: Web Applications
  • I: Cracking Web Passwords

Session 4

  • A: SQL Injections
  • B: SQL Attacks
  • C: Wireless Vulnerabilities
  • D: WEP Attacks
  • E: WPA and EAP
  • F: Viruses and Worms
  • G: Physical Security Policies

Session 5

  • A: Implementing Physical Security
  • B: Linux
  • C: Compiling Linux
  • D: Intrusion Monitoring Systems
  • E: Evading IMS
  • F: Buffer Overflows

Session 6

  • A: Cryptography
  • B: Symmetric Cryptography
  • C: Multi-Hat Hacking
  • D: Computer Forensics
  • E: Hack Prevention
  • F: Security Policies

Session 7: Research and Live Hacking

  • A: SIM cloning a Ethical way
  • B: Credit Card or ATM card cloning possibilities
  • C: How to create a secure server with CERT std
  • D: Virus coding

 
Design & Developed by : Intellicube Technolgy