This course will include but is not limited to the following objectives: Introduction to Ethical Hacking and the importance in our digital world.
Foot printing and Reconnaissance in the client environment.
The use of different types of scanning methodologies and tools.
Scanning networks, methodologies, draw networks diagrams and configure proxies.
Enumeration concepts and techniques, and enumeration countermeasures.
System hacking methodologies, password cracking, escalating privileges, types of key loggers, types of Spyware, and types of Rootkits and how to detect them.
Trojans and Backdoors concepts, detection, and countermeasures.
Viruses and Worms concepts and types, malware analysis, penetration testing for Viruses.
Sniffers fundamentals, MAC and DHCP Attacks, ARP and DNS Poisoning, Spoofing Attacks, Sniffing Tools, Countermeasures and Sniffing Pen Testing.
Social Engineering Fundamentals and Techniques, Impersonation on social networking sites, and identity theft.
Denial of Service Concepts and Countermeasures.
Session Hijacking Concepts, Session Hijacking Tools, and Countermeasures.
Hijacking Webservers and Attacks Tools, Countermeasures, Patch Management and Webserver Security Tools.
Hijacking Web Applications, Web App Threats, Web App Hacking Methodology, and Web App Pen Testing.
SQL Injection and Types, Testing for SQL Injection and Countermeasures.. This course will prepare the student to take the exam certification for C)PEH Certified Professional Ethical Hacker.
- Hacking Wireless Networks Concepts and Types, Wireless Encryption, Wireless Threats, Wireless Hacking Methodology, Man-in-the-Middle Attack, Countermeasures and Wireless Security Tools.
- Penetration Testing Types and Concepts, Phases, Techniques, and Pen Testing Roadmap. and more.