-
Introduction to Ethical Hacking – Key issues plaguing the information security world, incident management process, and penetration testing
-
Footprinting and Reconnaissance – Various types of footprinting, footprinting tools, and countermeasures
-
Network scanning techniques and scanning countermeasures
-
Enumeration techniques and enumeration countermeasures
-
Vulnerability Analysis – identify security loopholes in the target organization’s network, communication infrastructure, and end systems. This module covers the vulnerability management life cycle, and various approaches and tools.
-
System hacking methodology, steganography, steganalysis attacks, and covering tracks
-
Malware Threats
-
Packet sniffing techniques and how to defend against sniffing
-
Social Engineering techniques, identify theft, and social engineering countermeasures
-
DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
-
Session hijacking techniques and countermeasures
-
Evading Firewall, IDSs, and Honeypots – evasion techniques, evasion tools, and countermeasures
-
Different types of webserver attacks, attack methodology, and countermeasures
-
Hacking Web Applications
-
SQL injection attacks and injection detection tools
-
Hacking Wireless Networks
-
Hacking Mobile Platforms
-
IoT Hacking
-
Cloud Computing
-
Cryptography