Course Overview
Learning Objectives
- Introduction to Ethical Hacking
- Hacking Laws
- Foot printing
- Google Hacking
- Scanning
- Enumeration
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Sniffers
- Social Engineering
- Phishing
- Hacking Email Accounts
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Web Application Vulnerabilities
- Web Based Password Cracking Techniques
- SQL Injection
- Hacking Wireless Networks
- Physical Security
- Linux Hacking
- Evading IDS, Honeypots and Firewalls
- Buffer Overflows
- Cryptography
- Penetration Testing Methodologies
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):