Module 01: Introduction to Ethical Hacking
Key issues plaguing the information security world, incident management process, and penetration testing
Module 02: Footprinting and Reconnaissance
Various types of footprinting, footprinting tools, and countermeasures
Module 03: Scanning Networks
Network scanning techniques and scanning countermeasures
Module 04: Enumeration
Enumeration techniques and enumeration countermeasures
Module 05: Vulnerability Analysis
Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
Module 06: System Hacking
System hacking methodology, steganography, steganalysis attacks, and covering tracks.
Different types of Trojans, Trojan analysis, and Trojan countermeasures
Module 07: Malware Threat
Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
Module 08: Sniffing
Packet sniffing techniques and how to defend against sniffing
Module 09: Social Engineering
Social Engineering techniques, identify theft, and social engineering countermeasures
Module 10: Denial-of-Service
DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
Module 11: Session Hijacking
Session hijacking techniques and countermeasures
Module 12: Evading IDS, Firewalls, and Honeypots
Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
Module 13: Hacking Web Servers
Different types of webserver attacks, attack methodology, and countermeasures
Module 14: Hacking Web Applications
Different types of web application attacks, web application hacking methodology, and countermeasures
Module 15: SQL Injection
SQL injection attacks and injection detection tools
Module 16: Hacking Wireless Networks
Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wifi- security tools
Module 17: Hacking Mobile Platforms
Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
Module 18: IoT Hacking
Different threats to IoT platforms and learn how to defend IoT devices securely
Module 19: Cloud Computing
Various cloud computing concepts, threats, attacks, and security techniques and tools
Module 20: Cryptography
Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
And
Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap