Cyber Security & Ethical Hacker

Certified Ethical Hacking v10

Module 1. Introduction to Ethical Hacking

  • Overview of Current Security Trends
  • Understanding the Elements of Information Security
  • Understanding Information Security Threats and Attack Vectors
  • Overview of Hacking Concepts, Types, and Phases
  • Understanding Ethical Hacking Concepts and Scope
  • Overview of Information Security Controls
  • Overview of Penetration Testing
  • Overview of Information Security Acts and Laws

 

Module 2. Footprinting and Reconnaissance

  • Understanding Footprinting Concepts
  • Footprinting through Search Engines and Advanced Google Hacking Techniques
  • Footprinting through Web Services and Social Networking Sites
  • Understanding Websites Footprinting, Email Footprinting, and Competitive Intelligence
  • Understanding WHOIS, DNS and Network Footprinting
  • Footprint through Social Engineering
  • Understanding different Footprinting Tools and Countermeasures
  • Understanding Footprinting Penetration Testing

 

Module 3. Scanning Networks

  • Understanding Network Scanning Concepts
  • Understanding various Scanning Tools
  • Understanding various Scanning Techniques
  • Understanding various Techniques to Scan Beyond IDS and Firewall
  • Understanding Banner Grabbing
  • Drawing Network Diagrams
  • Overview of Scanning Pen Testing

 

Module 4. Enumeration

  • Understanding Enumeration Concepts
  • Understanding Different Techniques for NetBIOS Enumeration
  • Understanding Different Techniques for SNMP Enumeration
  • Understanding Different Techniques for LDAP and NTP Enumeration
  • Understanding Different Techniques for SMTP and DNS Enumeration
  • Understanding Other Enumerations such as IPsec, VOIP, RPS, and Linux/Unix Enumeration
  • Understanding Different Enumeration Countermeasures
  • Overview of Enumeration Pen Testing

 

Module 5. Vulnerability Analysis

  • Overview of Vulnerability Research and Vulnerability Classification
  • Overview of Vulnerability Assessment
  • Overview of Vulnerability Management Life Cycle (Vulnerability Assessment Phases)
  • Understanding Different Approaches of Vulnerability Assessment Solutions
  • Understanding Different Types of Vulnerability Assessment Tools
  • Overview of Vulnerability Scoring Systems
  • Vulnerability Assessment Tools
  • Overview of Vulnerability Assessment Reports

 

Module 6. System Hacking

  • Overview of CEH Hacking Methodology
  • Understanding Techniques to Gain Access to the System
  • Understanding Privilege Escalation Techniques
  • Understanding Techniques to Create and Maintain Remote Access to the System
  • Overview of Different Types of Rootkits
  • Overview of Stenography and Steganalysis Techniques
  • Understanding Techniques to Hide and Evidence of Compromise
  • Overview of System Hacking Penetration Testing

 

Module 7. Malware Threats

  • Understanding Malware and Malware Propagation Techniques
  • Overview of Trojans, Their Types, and How they Infect Systems
  • Overview of Viruses, Their Types, and How they Infect Files
  • Overview of Computer Worms
  • Understanding the Malware Analysis Process
  • Understanding Different Techniques to Detect Malware
  • Understanding Different Malware Countermeasures
  • Understanding Malware Penetration Testing

 

 

Module 8. Sniffing

  • Overview of Sniffing Concepts
  • Understanding Various Sniffing Techniques
  • Understanding How to Defend Against Various Sniffing Techniques
  • Overview of Various Sniffing Tools
  • Understanding Different Sniffing Countermeasures
  • Understanding Different Techniques to Detect Sniffing
  • Overview of Sniffing Penetration Testing

 

Module 9. Social Engineering

  • Understanding Social Engineering Concepts
  • Understanding various Social Engineering Techniques
  • Understanding Insider Threats
  • Understanding Impersonation on Social Networking Sites
  • Understanding Identity Theft
  • Understanding Different Social Engineering Countermeasures
  • Understanding Different Insider Threats and Identity Theft Countermeasures
  • Overview of Social Engineering Penetration Testing

 

Module 10. Denial-of-Service

  • Overview of Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
  • Understanding Different DoS/DDoS Attack Techniques
  • Understanding the Botnet Network
  • Understanding Various DoS and DDoS Attack Tools
  • Understanding Different Techniques to Detect DoS and DDoS Attacks
  • Understanding Different DoS/DDoS Countermeasures
  • Overview of DoS Attack Penetration Testing

 

Module 11. Session Hijacking

 

  • Understanding Session Hijacking Concepts
  • Understanding Application Level Session Hijacking
  • Understanding Network Level Session Hijacking
  • Overview of Session Hijacking Tools
  • Understanding Different Session Hijacking Countermeasures
  • Overview of Session Hijacking Penetration Testing

 

Module 12. Evading IDS, Firewalls, and Honeypots

  • Understanding IDS, Firewalls, and Honeypots Concepts
  • IDS, Firewalls, and Honeypots Solutions
  • Understanding Different Techniques to Bypass IDS understanding different Techniques to Bypass Firewalls
  • IDS/Firewall Evading Tools
  • Understanding different Techniques to Detect Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Overview of IDS and Firewall Penetration Testing

 

Module 13. Hacking Web Servers

  • Understanding Web Server Concepts
  • Understanding Web Server Attacks
  • Understanding Web Server Attack Methodology
  • Overview of Web Server Attack Tools
  • Understanding Different Web Server Attack Countermeasures
  • Understanding Patch Management Concepts
  • Overview of Web Server Security Tools
  • Overview of Web Server Penetration Testing

 

Module 14. Hacking Web Application

  • Understanding Web Application Concepts
  • Understanding Web Application Threats
  • Understanding Web Application Hacking Methodology
  • Overview of Web Application Hacking Tools
  • Understanding Different Web Application Attack’s Countermeasures
  • Overview of Web Application Security Testing Tools
  • Overview of Web Application Penetration Testing

 

Module 15. SQL Injection

  • Understanding SQL Injection Concepts
  • Understanding various types of SQL Injection Attacks
  • Understanding SQL Injection Methodology
  • Understanding various SQL Injection Tools
  • Understanding different IDS Evasion Techniques
  • Overview of SQL Injection Countermeasures
  • Overview of various SQL Injection Detection Tools

 

Module 16. Hacking Wireless Networks

  • Overview of Wireless Concepts
  • Overview of Wireless Encryption Algorithms
  • Understanding Wireless Threats
  • Understanding Wireless Hacking Methodology
  • Overview of Different Wireless Hacking Tools
  • Understanding Bluetooth Hacking Techniques
  • Overview of Wireless Hacking Countermeasures and Security Tools
  • Overview of Wireless Penetration Testing

 

Module 17. Hacking Mobile Platforms

  • Understanding Mobile Platform Attack Vectors
  • Understanding various Android Threats and Attacks
  • Understanding various iOS Threats and Attacks
  • Understanding various Mobile Spyware
  • Understanding Mobile Device Management (MDM)
  • Mobile Security Guidelines and Security Tools
  • Overview of Mobile Penetration Testing

 

Module 18. IoT Hacking

  • Understanding IoT Concepts
  • Overview of IoT Threats and Attacks
  • Understanding IoT Hacking Methodology
  • IoT Hacking Tools
  • IoT Hacking Countermeasures
  • IoT Security Tools
  • Overview of IoT Penetration Testing

 

Module 19. Cloud Computing

  • Understanding Cloud Computing Concepts
  • Understanding Cloud Computing Threats
  • Understanding Cloud Computing Attacks
  • Understanding Cloud Computing Security
  • Cloud Computing Security Tools
  • Overview of Cloud Penetration Testing

 

Module 20. Cryptography

  • Understanding Cryptography Concepts
  • Overview of Encryption Algorithms
  • Cryptography Tools
  • Understanding Public Key Infrastructure (PKI)
  • Understanding Email Encryption
  • Understanding Disk Encryption
  • Understanding Cryptography Attacks
  • Cryptography Tools

 

Course Duration : 40 Hours

Course Fee : 20,000.00 Taka. (Regular batch)

If you have more query feel free knocking us.
Email: Director@trianglesolutionsbd.com
Cell: 01750-158284 (Kamal Sir).

© 2000-2020: Triangle Solutions, All Rights Reserved | Awesome Theme by: D5 Creation | Powered by: WordPress