Description
In this course, you will learn :
- Basics of Ethical Hacking
- Laws and Compliance of Cyber Security
- Information Security Controls
- Information Gathering
- Target mapping
- Pre-attack phase of ethical hacking
- Mapping Network
- Understand a Network’s Security
- Various Enumeration Techniques
- Enumerate a target with different technologies
- Quickly deploy and identify target threats
- Discover public loopholes in network
- System Hacking Methodology
- Steganography
- Understanding and identifying malware
- Malware Countermeasures
- Auditing a system for malware
- Capture and analyze data packets
- Different techniques to sniff packets
- Social Engineering Attacks
- Audit Human-level Vulnerabilities
- Social Engineering Countermeasures
- DoD and DDoS Attacks
- DoS Countermeasures and Protection
- Various Attacks to hijack a live session
- Countermeasures for session Hijacking
- Firewall Security
- Working with Intrusion Detection System
- Firewall evasion techniques
- Hacking into a web server
- Patch management
- Scanning for Information from webserver
- Analyze OWASP based vulnerabilities
- Footprint web application
- Discover and Exploit vulnerabilities
- Hacking into Databases
- Database Security
- Wireless Network Security
- Wireless Network Hacking Methodology
- Wireless Security Testing tools
- Wireless Hacking Countermeasures
- Mobile Security
- Countermeasures and protection
- IoT Security and Technologies
- IoT Hacking countermeasures
- Cloud Security
- Server-less Computing threats
- Cloud Computing hacking methodology
- Cryptography
- Ciphers
- Public-Key Infrastructure
Syllabus :
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT and OT Hacking
- Cloud Computing
- Cryptography