Hack The Box Series Returns by Raheel Ahmad, CISSP | Hakin9 At - TopicsExpress



          

Hack The Box Series Returns by Raheel Ahmad, CISSP | Hakin9 At Hakin9, Newbies Becomes Hackers. Dont wait! Become a Certified Ethical Hacker. The new advanced and juicy bunch of hacking tricks and techniques course is coming live again with cutting edge hacking tools and unique experiences from beginners till advance level hacking. This workshop is consisting of total nine (9) modules and an online exam with in depth learning that will prepare you for your Certified Ethical Hacker (CEH) Exam. In addition, this will also bring Video Lectures for each lab module, instructor session for your questions and answers and more importantly by the end of workshop you will be requested to complete an online exam that will evaluate your hacking knowledge. Starting Date: February 7th, 2015 You should know ... This workshop is designed in such a way that will bring a newbie to a level where he or she can hack into systems. Don’t worry if you don’t know about hacking, we will teach you! You will learn ... You will learn hacking in each module and by the end of the workshop you will able to hack into systems and web applications. Online Exam ... You will be required to complete the online exam that would be of not less than 41 Questions all of those would be designed to test your actual hacking skills and not bookish knowledge. Syllabus Module 01 – Introduction to Ethical Hacking Information Security Core Concepts Information Security Threats Hacking Concepts Type of Cybercrime Information Security Controls Why Ethical Hacking Module 02 – Reconnaissance Information Gathering What is Footprinting Footprinting Methodology Web Application Footprinting Lookups Lab Exercise Module 03 – Hacking Windows OS CEH Hacking Methodology Network Scanning Ports & Service Scanning Vulnerability Scanning What is Enumeration NetBIOS Enumeration SNMP Enumeration SMB Enumeration Password Cracking Escalation Privileges Vulnerability Research & Exploitation Analysis Exploiting & Hacking into Systems Lab Exercise Module 04 - Hacking Linux Systems Linux File Systems Linux Basic Commands PHP Vulnerabilities Known Linux Vulnerabilities Exploiting Known Linux Vulnerabilities Lab Exercise Module 05 – Trojans, Viruses & Worms Trojan Concepts Purpose of Trojans Types of Trojans Hacking with Trojans Viruses & Worms Concepts Types of Viruses Computer Worms Hacking with Worms Lab Exercise Module 06 – Hacking Web Applications Webserver Concepts Web Server Attack Vectors Hacking Webservers Web Application Concepts Web Application Threats What is SQL Cross-Site Scripting Hacking Web Applications with Metasploit Lab Exercise Module 07 – SQL Injections Introduction to SQL Injections Known Types of SQL Injections Customize SQL Injections Advance SQL Injections Hacking with SQL Injections Lab Exercise Module 08 – Intrusion Detection & Prevention IDS & IPS Core Concepts Firewall Concepts Snort Concepts Firewall, IDS & IPS Evasion Techniques Lab Exercise Module 09 – Hacking via Buffer Overflows Buffer Overflow concepts Understanding Stack Stack-Based Buffer Overflows Understanding Heap Heap-Based Buffer Overflows No Operations (NOPs) Buffer Overflow Detections Lab Exercise If you have any questions, please contact me at [email protected]
Posted on: Tue, 27 Jan 2015 14:39:44 +0000

Trending Topics



Recently Viewed Topics




© 2015