EHCE

Ethical Hacking And Countermeasures Expert 

The truly complete network security course

This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. In recent years, many courses have cropped up offering training in so called "ethical hacking". But these courses deal with only one half of the security equation. To build highly secure networks, professionals need to be aware of different methods of hacking and at the same time know how to make networks secure from these intrusions using firewalls, UTMs, antivirus, etc. This is the only course which teaches both hacking and countermeasure techniques. And in keeping with Resolve Itech Corp standards, this course is entirely hands on and real time oriented. And need we say, the instructors are network security and intrusion specialists with several years of experience.

Brief Overview:

  • Ethical Hacking techniques
  • Countermeasure techniques
  • Patching / Hardening
  • Firewalls and UTMs

Ethical Hacking & Countermeasures Expert

Ethical hacking and Countermeasures Expert

Intrusion Techniques

Introduction to Ethical Hacking

  • What is Hacking & Who is a Hacker
  • Types of Hackers, Skills, Causes and Reasons
  • What is Ethical Hacking and what does an Ethical Hacker do
  • Scope and limitations of Ethical hacker
  • Phases of Hacking

External Hacking Techniques

Foot Printing

  • What is Foot Printing & its objectives
  • Finding a company's URL
  • Locate public and internal URLs
  • Gather companies Information
  • WHOIS lookup
  • Finding the range of IP Addresses
  • Finding the location of servers/DNS Information

Scanning

  • Types of Scanning
  • Finding live systems & open ports
  • Finding applications and Operating Systems
  • Vulnerability Scanners

Exploits

  • What is an Exploit
  • How to create an exploit / Find an exploit
  • Website defacing
  • Router hacking

Internal Hacking Techniques

Sniffing

  • What is Sniffing
  • What is promicious mode
  • How to capture packets in a network
  • Analysing the traffic captures
  • How to find usernames and passwords from captured traffic
  • How to read chat messages via packet captures

Password Cracking & Stealing

  • Password Cracking
  • Types of Password cracking methods
  • Password cracking tools
  • How passwords are being stolen
  • Shoulder surfing & USB password stealers
  • Password capturing tools & Keyloggers

Hacking by stealth

  • Virus, Worms, Trojans, Binders
  • Virus making tools

Using Linux tools to hack

  • What operating systems can be used
  • Linux based tools for Footprinting, Scanning
  • Using Metasploit framework to launch attacks on servers

Most popular hacker attacks

DoS Attack

  • What is a DoS Attack & Types of DoS Attacks
  • How DoS Attacks are done
  • Dos Attack Tools & Buffer Over Flow

Google Hacking

  • What is Google Hacking
  • Google Hacking Tricks & Google Hacking Database

Wireless Hacking

  • Wireless communication technologies
  • How is a Wi-Fi network setup
  • How does systems get connected to Wi-Fi networks
  • How Wi-Fi networks are protected
  • How to Hack Wi-Fi network passwords

Counter-measure Techniques

  • Sniffing
  • Password cracking/stealing
  • Malware attacks
  • Wireless network hacking
  • Scanning/exploitation

Physical Security

  • What is Physical Security and it's importance
  • How to implement physical security

Techniques for Covering Tracks

  • How to find the log locations
  • How to stop logging on a system
  • How to erase the logs

No comments:

Post a Comment

Accrediations

Accrediations