Description
In this course, you will :
- What is virtualization?.
- Install operating systems into virtualization (windows , linux ).
- Configuring networking in virtualization.
- Ethical Hacking terms and ethics.
- Phases of hacking.
- Attack categories and vectors.
- Concepts of footprinting.
- Search engine tools.
- Hacking using google tool.
- Website recon tools.
- Metagoofil tool.
- Email headers and footprinting.
- DNS tool.
- WHOIS.
- Network scanning overview and methodology.
- Port discovery.
- Network scanning tools.
- Stealth idle scanning.
- OS and application fingerprinting.
- Vulnerability scanning.
- Network mapping tools.
- Proxy servers.
- Enumeration concepts.
- Netbios enumeration.
- SNMP enumeration.
- LDAP enumeration.
- NTP enumeration.
- SMTP enumeration.
- System Hacking concepts.
- Password cracking.
- Sniffing ( Man in the middle attack).
- Rainbow crack.
- Password reset.
- DHCP starvation.
- Remote Access method.
- Spyware.
- NTFS alternate data stream exploit.
- Steganography.
- Covering track.
- Malware overview , malware analysis,.
- Trojan concepts , creating trojan.
- Virus.
- Switching security concepts and attack.
- DHCP snooping.
- ARP inspection.
- Social engineering.
- Denial of service attack.
- Session Hijacking.
- Hacking Web Servers.
- Buffer overflow.
- OWASP.
- SQL injection.
- Web app vulnerabilities.
- Wireless hacking concepts.
- Mobile Hacking.
- Firewall.
- IDS and IPS.
- Honeypots.
- Encryption concepts.