Ethical Hacking And Countermeasures Expert
The truly complete network security course
This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. In recent years, many courses have cropped up offering training in so called "ethical hacking". But these courses deal with only one half of the security equation. To build highly secure networks, professionals need to be aware of different methods of hacking and at the same time know how to make networks secure from these intrusions using firewalls, UTMs, antivirus, etc. This is the only course which teaches both hacking and countermeasure techniques. And in keeping with Resolve Itech Corp standards, this course is entirely hands on and real time oriented. And need we say, the instructors are network security and intrusion specialists with several years of experience.
Brief Overview:
- Ethical Hacking techniques
- Countermeasure techniques
- Patching / Hardening
- Firewalls and UTMs
Ethical Hacking & Countermeasures Expert
Ethical hacking and Countermeasures Expert
Intrusion Techniques
Introduction to Ethical Hacking
- What is Hacking & Who is a Hacker
- Types of Hackers, Skills, Causes and Reasons
- What is Ethical Hacking and what does an Ethical Hacker do
- Scope and limitations of Ethical hacker
- Phases of Hacking
External Hacking Techniques
Foot Printing
- What is Foot Printing & its objectives
- Finding a company's URL
- Locate public and internal URLs
- Gather companies Information
- WHOIS lookup
- Finding the range of IP Addresses
- Finding the location of servers/DNS Information
Scanning
- Types of Scanning
- Finding live systems & open ports
- Finding applications and Operating Systems
- Vulnerability Scanners
Exploits
- What is an Exploit
- How to create an exploit / Find an exploit
- Website defacing
- Router hacking
Internal Hacking Techniques
Sniffing
- What is Sniffing
- What is promicious mode
- How to capture packets in a network
- Analysing the traffic captures
- How to find usernames and passwords from captured traffic
- How to read chat messages via packet captures
Password Cracking & Stealing
- Password Cracking
- Types of Password cracking methods
- Password cracking tools
- How passwords are being stolen
- Shoulder surfing & USB password stealers
- Password capturing tools & Keyloggers
|
Hacking by stealth
- Virus, Worms, Trojans, Binders
- Virus making tools
Using Linux tools to hack
- What operating systems can be used
- Linux based tools for Footprinting, Scanning
- Using Metasploit framework to launch attacks on servers
Most popular hacker attacks
DoS Attack
- What is a DoS Attack & Types of DoS Attacks
- How DoS Attacks are done
- Dos Attack Tools & Buffer Over Flow
Google Hacking
- What is Google Hacking
- Google Hacking Tricks & Google Hacking Database
Wireless Hacking
- Wireless communication technologies
- How is a Wi-Fi network setup
- How does systems get connected to Wi-Fi networks
- How Wi-Fi networks are protected
- How to Hack Wi-Fi network passwords
Counter-measure Techniques
- Sniffing
- Password cracking/stealing
- Malware attacks
- Wireless network hacking
- Scanning/exploitation
Physical Security
- What is Physical Security and it's importance
- How to implement physical security
Techniques for Covering Tracks
- How to find the log locations
- How to stop logging on a system
- How to erase the logs
|
No comments:
Post a Comment