

Ethical Hacking
Course Outline
- Introduction to Ethical Hacking
- Information Security Overview
- Hacking Methodologies and Frameworks
- Hacking Concepts
- Ethical Hacking Concepts
- Information Security Controls
- Information Security Laws and Standards
- Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Web Services
- Footprinting through Social Networking Sites
- Website Footprinting
- Email Footprinting
- Whois Footprinting
- DNS Footprinting
- Network Footprinting
- Footprinting through Social Engineering
- Footprinting Tools
- Footprinting Countermeasures
- Scanning Networks
- Network Scanning Concepts
- Scanning Tools
- Host Discovery
- Port and Service Discovery
- OS Discovery (Banner Grabbing/OS Fingerprinting)
- Scanning Beyond IDS and Firewall
- Network Scanning Countermeasures
- Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP and NFS Enumeration
- SMTP and DNS Enumeration
- Other Enumeration Techniques
- Enumeration Countermeasures
- Vulnerability Analysis
- Vulnerability Assessment Concepts
- Vulnerability Classification and Assessment Types
- Vulnerability Assessment Tools
- Vulnerability Assessment Reports
- System Hacking
- Gaining Access
- Escalating Privileges
- Maintaining Access
- Clearing Logs
- Malware Threats
- Malware Concepts
- APT Concepts
- Trojan Concepts
- Worm Makers
- Fileless Malware Concepts
- Malware Analysis
- Malware Countermeasures
- Anti-Malware Software
- Sniffing
- Sniffing Concepts
- Sniffing Technique: MAC Attacks
- Sniffing Technique: DHCP Attacks
- Sniffing Technique: ARP Poisoning
- Sniffing Technique: Spoofing Attacks
- Sniffing Technique: DNS Poisoning
- Sniffing Tools
- Social Engineering
- Social Engineering Concepts
- Social Engineering Techniques
- Insider Threats
- Impersonation on Social Networking Sites
- Identity Theft
- Social Engineering Countermeasures
- Denial-of-Service
- DoS/DDoS Concepts
- Botnets
- DoS/DDoS Attack Techniques
- DDoS Case Study
- DoS/DDoS Attack Countermeasures
11.Session Hijacking
- Session Hijacking Concepts
- Application-Level Session Hijacking
- Network-Level Session Hijacking
- Session Hijacking Tools
- Session Hijacking Counter measures
12.Evading IDS, Firewalls, and Honeypots
- IDS, IPS, Firewall, and Honeypot Concepts
- IDS, IPS, Firewall, and Honeypot Solutions
- Evading IDS
- Evading Firewalls
- Evading NAC and Endpoint Security
- IDS/Firewall Evading Tools
- Detecting Honeypots
- IDS/Firewall Evasion Countermeasures
13.Hacking Web Servers
- Web Server Concepts
- Web Server Attacks
- Web Server Attack Methodology
- Web Server Attack Countermeasures
- Web Application Concepts
14.Hacking Web Applications
- Web Application Threats
- Web Application Hacking Methodology
- Web API, Webhooks, and Web Shell
- Web Application Security
15.SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- SQL Injection Countermeasures
16.Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Hacking Tools
- Bluetooth Hacking
- Wireless Attack Countermeasures
- Wireless Security Tools
17.Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Mobile Device Management
- Mobile Security Guidelines and Tools
18.IoT and OT Hacking
- IoT Hacking
- IoT Concepts
- IoT Attacks
- IoT Hacking Methodology
- OT Hacking
- OT Concepts
- OT Attacks
- OT Hacking Methodology
19.Cloud Computing
- Cloud Computing Concepts
- Container Technology
- Manipulating CloudTrial Service
- Cloud Security
- Cryptography
- Cryptography Concepts
- Encryption Algorithms
- Cryptography Tools
- Email Encryption
- Disk Encryption
- Cryptanalysis
- Cryptography Attack Countermeasures
Fee: Rs 7,499 + 18% GST
100% subsidized cost for Naveen Jindal Foundation registered students
100% subsidized cost for Naveen Jindal Foundation registered students



