1. ETHICAL HACKING - OVERVIEW
- Types of Hacking
- Purpose of Hacking
2. ETHICAL HACKING - HACKER TYPES
- White Hat Hackers
- Black Hat Hackers
- Grey Hat Hackers
- Suicide Hackers
- Phreaks
3. ETHICAL HACKING - TERMS USED
4. ETHICAL HACKING - TOOLS
5. ETHICAL HACKING - SKILLS
- Basic Skills
- Courses &Certifications
6. ETHICAL HACKING - STEPS
- FOOTPRINTING
- SCANNING
- ENUMERATION
- SYSTEM HIJACKING
- TROJANS
- VIRUS & WORMS
- SNIFFING
- SESSION HIJACKING
- WEB HIJACKING
- CRYPTOGRAPHY
- WIRELESS NETWORK HIJACKING
- ETHICAL HACKING - PHASE OF HACKING
7. ETHICAL HACKING - FOOTPRINTING
- Active Footprinting
- Passive Footprinting
- Domain Name Information
- Finding IP Address
- Finding Registrar & Hosting Company
- IP Address Ranges
- Google Hacking
- Email Tracing
- Any Website's History in Past Months or Years
- Email Tracking
- Website Copying
8. ETHICAL HACKING - PROXY
- Direct Proxy
- Logged Proxy
- Proxy Chains
- Proxy Chaining Tools
9. ETHICAL HACKING - SCANNING
- Why is scanning important?
- Types of Scanning
- Steps and Protocols
- IP Range Scanning Tools
10. ETHICAL HACKING - PRACTICAL LAB SETUP
- Virtual Machines
- Advantages of VMs
- Other OSs
- Virtualization
- Linking Host and Guest
11. ETHICAL HACKING - ENUMERATION
- Introduction
- Types
- Terms
12. ETHICAL HACKING - WINDOWS HACKING
- Registry Editing
- Keys and Values
- Risks of Editing
- User Access Control (UAC)
- Types of Password Attack
13. ETHICAL HACKING - PASSWORD HACKING
- Hiren's Boot CD
- Windows Password Cracking
- Kon Boot
- Keylogging
14. ETHICAL HACKING- STEGANOGRAPHY & CRYPTOGRAPHY
- History
- Tools
- Difference
15. ETHICAL HACKING - SNIFFING
- Types of Sniffing
- SSL and HTTPS Protocol Analyze
- DHCP Attack
- MAC Attack
- Spoofing Attack
- Switch and Hub
- MITM
16. ETHICAL HACKING - VIRUS / WORMS / TROJAN
- Batch Virus
- Virus Designing
- Usage and Misusage
- Trojan Attacks
- Difference between them
17. ETHICAL HACKING - SOCIAL ENGINEERING
- Attack Cycle
- Types Social Engineering Attack
- Phishing
18. ETHICAL HACKING - Web Hacking
- HTML Based Attacks
- Web Servers
- Parameter Tampering
- Path Traversal Attacks
- XSS (Cross-Site Scripting)
- Web Spidering
- Cookies Poising
- Cookie Parameter
- Web Hacking Practical Lab Setup on PC/Laptop
- Types of XSS
19. ETHICAL HACKING - SQL INJECTION
- SQL Queries
20. ETHICAL HACKING - DDOS ATTACKS
- SYN Flood Attacks
- Ping Flood Attacks
21. ETHICAL HACKING - BUFFER OVERFLOW
- What is Buffer?
- Data Segmentation - Heap and Stack
22. ETHICAL HACKING - SESSION HIJACKING
- 3 Way Handshake
- Types of Session Hijacking
- Spoofing vs Hijacking
- Advantages of Session Hijacking to Attacker
23. ETHICAL HACKING - CERTIFICATIONS & CAREER OPPORTUNITIES
Â
For detailed info and Trainers Profile,check Ethical Hacking Course in Vapi, Daman, Slvassa and Valsad