ICCEH( InjectorCode Certified Ethical Hacker ) This Training - TopicsExpress



          

ICCEH( InjectorCode Certified Ethical Hacker ) This Training will demonstrate to participants how to scan, test, hack and secure their own systems in an interactive environment. The lab intensive environment gives each participant in-depth knowledge and practical experience with the current essential security systems. Participants will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. They will then learn how intruders escalate privileges and what steps can be taken to secure a system. They will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attack.Practices that will be of valuable use to you and your organization. Who should attend? Students IT Managers Information Security Managers Security Consultants Security Architects Security Specialists Network Specialists Network Engineers System Administrators IS Auditors. Law Professionals Banking & finance Sector Professionals. Web Developers Course Highlights & Benefits: • Live Demonstration of Latest Hacking Techniques & tools. • Hands on Practice Sessions. Course Contents: Chapter 1 – Introduction Understand Ethical Hacking terminology. Define the job role of an Ethical Hacker. Understand the different phases involved in Ethical Hacking. Identify different types of Hacking Technologies. What is Hacktivism? List different types of Hacker classes. Define the skills required to become an Ethical Hacker. What is Vulnerability Research? What is Exploit? Chapter 2 - Networking & Basics What is OS. What is Networking. Types of Network. Topologies Ip Addressing. Classification of Ip address. Protocols. Chapter 3 – Footprinting Define the term Footprinting. Describe Information gathering methodology. Describe Competitive Intelligence. Understand DNS Enumeration. Understand Whois. Identify different types of DNS records. Understand How Traceroute is used in Footprinting. Understand How Email Tracking works. Chapter 4 - Scanning Define the terms Port scanning, Network(ip) scanning, and Vulnerability scanning. Understand the CEH scanning methodology. Understand Ping Sweep techniques. Understand Nmap command switches. Understand Banner grabbing and OS Fingerprinting Techniques. Understand Network mapping methodology. Network Vulnerablity Scanning. Chapter 5 - Proxy Server & Packet Filtering Understand How proxy servers are used in launching an attack & Security Purpose. Understanding Single and Multi proxy methodology. How do Anonymizers work. Online base Anonymous hiding ip methodology. Understanding Proxy workbench technique. List of many new proxy sites. Russian proxy server technique. Chapter 6-Virtual Private Network What is VPN. How Vpn server work. How to hide original identification with the help of vpn tunnel. Chapter 7 – System Hacking Understanding Password cracking techniques. Understanding different types of Passwords. Identifying various Password cracking tools. Understand Escalating privileges. Understanding keyloggers and other Spyware Technologies. Understand How to hide files. Understand How to cover your tracks and erase evidence. Antimalware Technology. Antikeylogger Technology. Antispying Technology. Chapter 8 – Virus,Worms,Trojans & Backdoors,Rat. Understanding about Malware Analysis. Types of Malware. Understand the difference between a Virus and a Worm’s. Understand the types of viruses. How a virus spreads and infects the system. What is a Trojan or Backdoor’s. List the different types of Trojans. What are the indications of a Trojan attack? What is meant by “wrapping”? What are the countermeasure techniques. What is RAT? What is Binder? What is Fud? What is Crypter? Different types of Remote Hacking methodology? Making Virus using Virus maker tool. Chapter 9 - Sniffer Understand the Protocol Susceptible to Sniffing. Understand Active and Passive sniffing. Understand ARP poisoning. Understand Wireshark Technology. Chapter 10 - Denial of Service(DOS,DDos) Understand the types of DoS Attacks. Understand How DDoS attack works. Describe the DoS/DDoS countermeasures. Chapter 11- Vulnerability Assessment & Penetration Testing Overview of Vulnerablity Assessment penetration testing methodologies. Manual Testing v/s Automatic Testing. List the penetration testing steps. Overview of the pen-test legal framework. List the Automated Penetration Testing tools. Understanding How a web application works. Chapter 12 - SQL Injection. What is SQL injection? Understand the steps to conduct SQL injection. Understand SQL Server vulnerabilities. Practical SQL injection Attack & countermeasures. Chapter 13 – XSS What is xss? Persistent & Non Persistent XSS. Understand XSS Vulnerablities. Practical XSS attack & Countermeasures. Chapter 14- Linux Hacking Linux Hacking Understand How to install a Linux. Understand 14 Directory of linux. Understand Root password cracking method. Understand Linux command methodology. Chapter 15 - Firewall & IDS,IPS & Honeypots. Understand about Firewall methodology Software firewall. Hardware firewall. Understand about Intrusion Detection System. Understand about Intrusion Prevention System. What is Honeypots? Chapter 16-Cryptography and Stegnography View of Cryptography and Encryption techniques. Types of Encryption Techniques. Describe How public and private keys are generated. What is Digital Signature? Overview of MD5, SHA, RC4, RC5. What is Stegnography? Hide Secret Message in a Image,Video,Audio,Folder. Chapter 17-Email Hacking & Security Password Recovery Technique. Email Spoofing Attack. Email Bombing Attack. Email Phishing Attack. Password Protected Encrption Methodology. Advance strong Password Create Methodology. Two way Authentication Security. Email Traceout Utility. Chapter 18 - Reverse Engineering. Overview of Reverse Engineering Metohodology. About few Intro Assembler & Dissambler Ollydebug,Mona.py,Nasm Chapter 19-Software Piracy and Warez,DRM. Main discussion for software piracy or warez. Process of Software Activation. Abusive Copies. Cracked Copies. What is DRM? Best information for software security. Secure Testing for software Chapter 20-Mobile Hacking. CALL spoofing attack. Chapter 21- Metasploit Framework (Basic on Backtrack). Intro About Metasploit. Metasploit Interfaces Exploit. Auxilliary Scanner. Chapter 22- Understanding Cyber Law Chapter 23- Physical Security Chapter 24- Hacking Webserver Chapter 25- Session Hijacking Deliverances by Injectorcode IT Security Training & Services. • Online /Onsite Exam. • Training Certificate. • Project Certificate. • Tools DVD And PDF And PPT Files. • Extra Software for Tech • Course Duration: 30 Days [2hr/day] or 15 Days [4hr/day] • Source of teaching: Online / Classroom training • Fees:-12000INR for Indian Student • Fees:-225USD for Foreign Student Further Information If you would like to know more info about this course please either call us on +91 8871724857 or send an email to info@injectorcode or officialbhmayur@gmail https://facebook/groups/InjectorCode/
Posted on: Sat, 12 Jul 2014 08:49:31 +0000

Recently Viewed Topics




© 2015