Ethical Hacking And Prevention Training

by Dynamic Networking Institute Claim Listing

This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. This is the only course which teaches both hacking and countermeasure techniques.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Dynamic Networking Institute Logo

img Duration

Please Enquire

Course Details

This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. This is the only course which teaches both hacking and countermeasure techniques.

And in keeping with Dynamic's standards, this course is entirely hands on and real time oriented. And need we say, the instructors are network security and intrusion specialists with several years of experience.

 

Content:

  • Brief Overview:
  • • Introduction to Ethical Hacking
  • • Footprinting, Scanning, and Enumeration
  • • System Hacking
  • • Sniffers
  • • Malware
  • • DoS, SQL injection attacks
  • • Malware
  • • Social Engineering
  • • Phishing
  • • Hacking Mobile Device
  • • Cryptography
  • • Wireless Hacking
  • • Cloud Computing
  • Ethical Hacking and Prevention
  • Introduction to Ethical Hacking
  •  What is Hacking
  • Who is a Hacker
  • Skills of a Hacker
  • Types of Hackers
  • Reasons for Hacking
  • Who are at the risk of Hacking attacks
  • Effects of Computer Hacking on an organization
  • Network Security Challenges
  • Elements of Information Security
  • The Security, Functionality & Usability Triangle
  • What is Ethical Hacking
  • Why Ethical Hacking is Necessary
  • Scope & Limitations of Ethical Hacking
  • What is Penetration Testing
  • What is Vulnerability Auditing
  • FootPrinting
  • What is FootPrinting
  • Objectives of FootPrinting
  • Finding a company’s details
  • Finding a company’s domain name
  • Finding a company’s Internal URLs
  • Finding a company’s Public and Restricted URLs
  • Finding a company’s Server details
  • Finding the details of domain registration
  • Finding the range of IP Address
  • Finding the DNS information
  • Finding the services running on the server
  • Finding the location of servers
  • Traceroute analysis
  • Tracking e-mail communications
  • Scanning
  • What is network scanning
  • Objectives of network scanning
  • Finding the live hosts in a network
  • SNMP Enumeration
  • SMTP Enumeration
  • DNS Enumeration
  • Finding open ports on a server
  • Finding the services on a server
  • OS fingerprinting
  • Server Banner grabbing tools
  • What is a Vulnerability Scanning
  • Vulnerability Scanner tools
  • Finding more details about a vulnerability
  • What is a proxy server
  • How does proxy server work
  • Types of proxy servers
  • How to find proxy servers
  • Why do hackers use proxy servers
  • What is a TOR network
  • Why hackers prefer to use TOR networks
  • Hacking Web Servers & Web Applications
  • What is a web server
  • Different webserver applications in use
  • Why are webservers hacked & its consequences
  • Directory traversal attacks
  • Website defacement
  • Website password brute forcing
  • How to defend against web server hacking
  • Session Hijacking
  • What is session hijacking
  • Dangers of session hijacking attacks
  • Session hijacking techniques
  • Cross-Site scripting attack
  • Session hijacking tools
  • How to defend against session hijacking
  • SQL Injectionv
  • What is SQL Injection
  •  Effects of SQL Injection attacks
  • Types of SQL Injection attacks
  • SQL Injection detection tools
  • Evading Firewalls, IDS & Honeypots
  • What is a Firewall
  • What are the functions of a Firewall
  • What is an IDS
  • How does an IDS work
  • SPAN
  • IDS tools
  • What is a honeypot
  • Types of honeypots
  • Honeypot tools
  • Honeypot detection tools
  • Buffer Overflow
  • What is a buffer
  • Understanding usage of buffers in applications
  • What is buffer overflow
  • Simple buffer overflow in C programming
  • How to detect a buffer overflow
  • How to defend against buffer overflow attacks
  • Denial of Service
  • What is a DoS attack
  • What is a DDoS attack
  • Symptoms of a Dos attack
  • DoS attack techniques
  • What is a Botnet
  • Defending DoS attacks
  • Cryptography
  • What is Cryptography
  • Types of cryptography
  • Cipher algorithms
  • Public key infrastructure
  • What is a Hash
  • Cryptography attacks
  • System Hacking
  • What is system Hacking
  • Goals of System Hacking
  • Password Cracking
  • Password complexity
  • Finding the default passwords of network devices and softwares
  • Password cracking methods
  • o Online password cracking
  • Man-in-the-middle attack
  • Password guessing
  • o Offline password cracking
  • Brute force cracking
  • Dictionary based cracking
  • Hybrid attack
  • USB password stealers
  • Elcomsoft Distributed password recovery tools
  • Active password changer
  • What is a keylogger
  • How to deploy a keylogger to a remote pc
  • How to defend against a keylogger
  • Sniffers
  • What is a sniffer
  • How sniffer works
  • Types of sniffing
  • o Active sniffing
  • o Passive Sniffing
  • What is promiscuous mode
  • How to put a PC into promiscuous mode
  • What is ARP
  • ARP poison attack
  • Threats of ARP poison attack
  • How MAC spoofing works
  • MAC Flooding
  • What is a CAM Table
  • How to defend against MAC Spoofing attacks
  • How to defend against Sniffers in network
  • Puducherry Branch

    6, 2nd Street, Puducherry

Check out more CEH (Certified Ethical Hacker) courses in India

AITMS Logo

Certified Ethical Hacking (ACEH)

Certified Ethical Hacking (ACEH) course is offered by AITMS. We offer various career courses that ensure excellent job opportunities for students. We specialize in Technical and Management Courses as it give instant access to self-employment, money & position in society. 

by AITMS [Claim Listing ]
Livewire Logo

Ethical Hacking Course

Ethical Hacking is the process of breaking into an organization's IT networks and systems to test their weakness and vulnerabilities. There are five phases in hacking. They include reconnaissance, gaining access, enumeration, maintaining access, and covering tracks.

by Livewire [Claim Listing ]
AIS Education Logo

CEH (Certified Ethical Hacker)

CEH (Certified Ethical Hacker) course is offered by AIS Education. In our bid to achieve our goals and fulfill our vision, we realize that quality is the crux, and it is only through quality teaching that we want our network of students to widen.

by AIS Education [Claim Listing ]
IACT Education Logo

Ethical Hacking

Ethical Hacking course is offered by IACT Education. IACT is an inimitable organization working with single-minded purpose to bring a gigantic transformation in the world. It draws knowledge from a pool of proficiency and experience to offer the best and the most practical education to its students...

by IACT Education [Claim Listing ]
CSDT Centre Logo

Ethical Hacking Training

CSDT IT Solution has designed its Ethical Hacking courses so well that, searching a job in the market after finishing of the course is very easy. You Will get several job offers from reputed organizations in market.

by CSDT Centre [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy