Description
Syllabus :
1. Introduction to Ethical Hacking
- Information Security Controls, Laws, and Standards
- Hacking and Ethical Hacking Concepts
- Cyber Kill Chain Concepts
- Information Security Overview
- Course Introduction
- Welcome to the Penetration Testing and Ethical Hacking Certification Prep program!
2. Footprinting and Reconnaissance
- Network Footprinting
- Footprinting Through Different Services
- Footprinting Concepts
3. Scanning Networks
- OS Discovery, Scanning Beyond IDS and Firewall
- Host, Port, and Service Discovery
- Network Scanning Concepts
4. Enumeration
- LDAP, NTP, NFS, SMTP, and DNS Enumeration
- NetBIOS Enumeration and SNMP Enumeration
- Enumeration Concepts
5. Vulnerability Analysis
- Vulnerability Assessment Solutions and Tools
- Vulnerability Assessment Concepts
6. System Hacking
- Maintaining Access, Executing Applications, Hiding Files, and Clearing Logs
- Vulnerability Exploitation and Escalating Privileges
- System Hacking Concepts, Gaining Access, and Cracking Passwords
7. Malware Threats
- Malware Analysis and Countermeasures
- Virus and Worms
- APT and Trojans
- Malware Concepts
8. Sniffing
9. Social Engineering
10. Denial-of-Service
- DoS/DDoS
- Penetration Testing & Ethical Hacking - Study Break!
11. Session Hijacking
- Session Hijacking Countermeasures
- Session Hijacking
12. Evading IDS, Firewalls, and Honeypots
13. Hacking Web Servers
- Webserver Concepts, Attacks, Attack Methodology, and Countermeasures
14. Hacking Web Applications
15. SQL Injection
16. Hacking Wireless Networks
17. Hacking Mobile Platforms
18. IoT and OT Hacking
- OT Hacking
- IoT Hacking
19. Cloud Computing
20. Cryptography
- Encryption and Cryptographic Attacks
- Cryptography
- Penetration Testing & Ethical Hacking Practice Test