Ethical Hacking Course Content
You will be exposed to the complete Ethical Hacking Training Coursecourse details in the below sections.
Description:
In this ethical hacking online training module, you will learn the basic concepts of Information security and Ethical Hacking.
Chapter 1.1: Information Security Overview
- Important Terminology
- Components of Information Security
- Functionality, Usability, and Security
Chapter 1.2: Information Security Attack and Threats vendors
- Objectives of the Information Security Attacks
- Kinds of Information Security Threat
- Kinds of Attacks on the System
- Best Information Security Attack Vendors
- Information warfare
Chapter 1.3: Hacking
- Define Hacking
- Hacker Classes
- Hacker Phases
- Reconnaissance
- Scanning
- Gaining and Maintaining Access
- Clearing Tracks
Chapter 1.4: Ethical Hacking Concepts
- Define Ethical Hacking
- Importance of Ethical Hacking
- Extent and Restrictions of Ethical Hacking
- Expertise of an Ethical Hacker
Chapter 1.5: Controls of Information Security
- Information Assurance
- Information Security Management Program
- Enterprise Information Security Architecture
- Network Security Zoning
- Policies of Information security
- Kinds of Security Policies
- Security Policies examples
- Creating and Implementing Security Policies
- Private policies at office
Chapter 1.6: Physical Security
- Kinds of Physical Security Control
- Physical Security Control
Chapter 1.7: Risk
- Risk Management
- Important Roles and Functions in Risk Management
Chapter 1.8: Threat Modeling
Chapter 1.9: Incident Management
Description:
This ethical hacking virtual classroom training module discusses the concepts like the intent of footprinting, google hacking database, footprinting through job sites, footprinting through web services, and footprinting tools.
Chapter 2.1: FootPrinting Concepts
- Define FootPrinting
- Intent of FootPrinting
Chapter 2.2: FootPrinting through the Search Engines
- FootPrinting using search engines and modern Google Hacking Techniques
- Collecting Information through Google Advanced Search and Image Search
- Google Hacking Database
- VPN and VoIP FootPrinting through the Google Hacking Database
Chapter 2.3: FootPrinting using Web Services
- Discovering the Organization's Top-Level Domains and Sub-domains
- Discovering the Geographical location of the Intent
- People Search on People Search Sites and Social Networking Sites
- Collecting Information from LinkedIn and Financial Services
- FootPrinting using Job sites
- Monitoring Target through Alerts
- Collecting Information through Groups, Forms, and Blogs
Chapter 2.4: Website FootPrinting and Email FootPrinting
- Website FootPrinting through Web Spiders
- Mirroring Entire website and Fetching website information from www.archieve.org
- Fetching Metadata of Public Documents and Controlling the web pages for changes and updates.
- Tracing Email Communication
- Gathering Information from the Email Header
- Email Tracking Tools
Chapter 2.5: DNS FootPrinting and Network FootPrinting
- Fetching DNS Information and DNS examination tools
- Finding the Network Range
- Traceroute and Traceroute Tools
Chapter 2.6: FootPrinting Tools
- Maltego and Recon-ng
- FOCA and Recon-Dog
- OSRFramework and Other FootPrinting Tools
Chapter 2.7: FootPrinting Counterattacks and Pen Testing
- FootPrinting Counterattacks
- FootPrinting Report Templates
Description:
This module provides you with a detailed look at network scanning overview, network scanning techniques, Nmap, port scanning counterattacks, and scanning IDS, penetration testing, and firewalls.
Chapter 3.1: Network Scanning Basics
- Network Scanning Overview
- TCP communication flags
- TCP/IP communication
- Setup custom packet through TCP flags
- Scanning in IPV6 Networks
Chapter 3.2: Network Scanning Tools
- Nmap
- Hping2/Hping3
- Scanning Tools for Web and Mobile
Chapter 3.3: Network Scanning Techniques
- Scanning Techniques
- Port scanning Counterattacks
Chapter 3.4: Network Diagrams
- Drawing Network Diagrams
- Network Discovery and Mapping Tools
- Network Discovery Tools for Mobile
Chapter 3.5: Scanning IDS, Firewall, and Pen Testing
- IDS or Firewall Evasion Techniques
- Scanning Pen Testing
Most of the Ethical Hacking Jobs in the industry expect the following add-on skills. Hence, we offer these skills-set as FREE Courses (Basics) to ease your learning process and help you stay ahead of the competition.