Certified Ethical Hacker (CEH)

About Course
Certified Ethical Hacker (CEH) training equips cybersecurity professionals with skills to identify vulnerabilities in computer systems and networks using the same tools and techniques as malicious hackers. It covers areas such as penetration testing, ethical hacking methodologies, and network security principles. Aimed at IT professionals, it prepares them to protect organizations by proactively assessing and mitigating security risks. Certification demonstrates expertise in ethical hacking, enhancing career opportunities in cybersecurity roles by validating knowledge in offensive security techniques crucial for safeguarding systems, maintaining compliance, and mitigating cyber threats effectively.
What Will You Learn?
- 1. In-Demand Skills
- 2. Career Advancement
- 3. Efficient CRM Management
- 4. Data Security
- 5. Workflow Automation
- 6. Reporting Insights
- 7. Job OpportunitiesHours On Demanded Videos
Course Content
Module 01: Introduction to Ethical Hacking
1.1 Internet is an Integral Part of Business and Personal Life – What Happens Online in 60 Seconds
1.2 Essential Terminology
1.3 Elements of Information Security
1.4 The Security, Functionality, and Usability Triangle
1.5 Motives, Goals, and Objectives of Information Security Attacks
1.6 Top Information Security Attack Vectors
1.7 Information Security Threat Categories
1.8 Types of Attacks on a System
1.9 Information Warfare
1.10 What is Hacking?
1.11Who is a Hacker?
1.12 Hacker Classes
1.13 Hacking Phases
1.14 What is Ethical Hacking?
1.15 Why Ethical Hacking is Necessary
1.16 Scope and Limitations of Ethical Hacking
1.17 Skills of an Ethical Hacker
1.18 Information Assurance (IA)
1.19 Information Security Management Program
1.20 Enterprise Information Security Architecture (EISA)
1.21 Network Security Zoning
1.22 Defense-in-Depth
1.23 Information Security Policies
1.24 Physical Security
1.25 What is Risk?
1.26 Threat Modeling
1.27 Incident Management
1.28 Security Incident and Event Management (SIEM)
1.29 User Behavior Analytics (UBA)
1.30 Network Security Controls
1.31 Identity and Access Management (IAM)
1.32 Data Leakage
1.33 Data Backup
1.34 Data Recovery
1.35 Role of AI/ML in Cyber Security
1.36 Penetration Testing
1.37 Why Penetration Testing
1.38 Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
1.39 Blue Teaming/Red Teaming
1.40 Types of Penetration Testing
1.41 Phases of Penetration Testing
1.42 Security Testing Methodology
1.43 Payment Card Industry Data Security Standard (PCI-DSS)
1.44 ISO/IEC 27001:2013
1.45 Health Insurance Portability and Accountability Act (HIPAA)
1.46 Sarbanes Oxley Act (SOX)
1.47 The Digital Millennium Copyright Act (DMCA)
1.48 Federal Information Security Management Act (FISMA)
1.49 Cyber Law in Different Countries
Quiz Module 01
Section A: Short Answer Questions
Section B: Case Study Analysis
Section C: Research-Based Questions
Section D: Practical Task
Module 02: Footprinting and Reconnaissance
2.1 What is Footprinting?
2.2 Objectives of Footprinting
2.3 Footprinting through Search Engines
2.4 Footprint Using Advanced Google Hacking Techniques
2.5 Information Gathering Using Google Advanced Search and Image Search
2.6 Google Hacking Database
2.7 VoIP and VPN Footprinting through Google Hacking Database
2.8 Finding Company’s Top-Level Domains (TLDs) and Sub-Domains
2.9 Finding the Geographical Location of the Target
2.10 People Search on Social Networking Sites and People Search Services
2.11 Gathering Information from LinkedIn
2.12 Gathering Information from Financial Services
2.13 Footprinting through Job Sites
2.14 Monitoring Target Using Alerts
2.15 Information Gathering Using Groups, Forums, and Blogs
2.16 Determining the Operating System
2.17 VoIP and VPN Footprinting through SHODAN
2.18 Collecting Information through Social Engineering on Social Networking Sites
2.19 Website Footprinting
2.20 Website Footprinting using Web Spiders
2.21 Mirroring Entire Website
2.22 Extracting Website Information from https://archive.org
2.23 Extracting Metadata of Public Documents
2.24 Monitoring Web Pages for Updates and Changes
2.25 Tracking Email Communications
2.26 Collecting Information from Email Header
2.27 Email Tracking Tools
2.28 Competitive Intelligence Gathering
2.29 Competitive Intelligence – When Did this Company Begin? How Did it Develop?
2.30 Competitive Intelligence – What Are the Company’s Plans?
2.31 Competitive Intelligence – What Expert Opinions Say About the Company
2.32 Monitoring Website Traffic of Target Company
2.33 Tracking Online Reputation of the Target
2.34 Whois Lookup
2.35 Whois Lookup Result Analysis
2.36 Whois Lookup Tools
2.37 Finding IP Geolocation Information
2.38 Extracting DNS Information
2.39 DNS Interrogation Tools
2.40 Locate the Network Range
2.41 Traceroute
2.42 Traceroute Analysis
2.43 Traceroute Tools
2.44 Footprinting through Social Engineering
2.45 Collect Information Using Eavesdropping, Shoulder Surfing, and Dumpster Diving
2.46 Maltego
2.47 Recon-ng
2.48 FOCA
2.49 Recon-Dog
2.50 OSRFramework
2.51 Additional Footprinting Tools
2.52 Footprinting Countermeasures
2.53 Footprinting Pen Testing
2.54 Footprinting Pen Testing Report Templates
Quiz Module 02
Section A: Short Answer Questions
Section B: Case Study Analysis
Section C: Research-Based Questions
Section D: Practical Task
Quiz Module 02
Module 03: Scanning Networks
3.1 Overview of Network Scanning
3.2 TCP Communication Flags
3.3 TCP/IP Communication
3.4 Creating Custom Packet Using TCP Flags
3.5 Scanning in IPv6 Networks
3.6 Nmap
3.7 Hping2 / Hping3
3.8 Scanning Tools
3.9 Scanning Tools for Mobile
3.10 Scanning Techniques
3.11 IDS/Firewall Evasion Techniques
3.12 Banner Grabbing
3.13 How to Identify Target System OS
3.14 Banner Grabbing Countermeasures
3.15 Drawing Network Diagrams
3.16 Network Discovery and Mapping Tools
3.17 Network Discovery Tools for Mobile
3.18 Scanning Pen Testing
Quiz Module 03
Section A: Short Answer Questions
Section B: Case Study Analysis
Section C: Research-Based Questions
Section D: Practical Task
Module 04: Enumeration
4.1 What is Enumeration?
4.2 Techniques for Enumeration
4.3 Services and Ports to Enumerate
4.4 NetBIOS Enumeration
4.5 NetBIOS Enumeration Tools
4.6 Enumerating User Accounts
4.7 Enumerating Shared Resources Using Net View
4.8 SNMP (Simple Network Management Protocol) Enumeration
4.9 Working of SNMP
4.10 Management Information Base (MIB)
4.11 SNMP Enumeration Tools
4.12 LDAP Enumeration
4.13 LDAP Enumeration Tools
4.14 NTP Enumeration
4.15 NTP Enumeration Commands
4.16 NTP Enumeration Tools
4.17 SMTP Enumeration
4.18 SMTP Enumeration Tools
4.19 DNS Enumeration Using Zone Transfer
4.20 IPsec Enumeration
4.21 VoIP Enumeration
4.22 RPC Enumeration
4.23 Unix/Linux User Enumeration
4.24 Enumeration Countermeasures
4.25 Enumeration Pen Testing
Quiz Module 04
Section A: Short Answer Questions
Section B: Case Study Analysis
Section C: Research-Based Questions
Section D: Practical Task
Module 05: Vulnerability Analysis
5.1 Vulnerability Research
5.2 Vulnerability Classification
5.3 What is Vulnerability Assessment?
5.4 Types of Vulnerability Assessment
5.5 Vulnerability-Management Life Cycle
5.6 Comparing Approaches to Vulnerability Assessment
5.7 Working of Vulnerability Scanning Solutions
5.8 Types of Vulnerability Assessment Tools
5.9 Characteristics of a Good Vulnerability Assessment Solution
5.10 Choosing a Vulnerability Assessment Tool
5.11 Criteria for Choosing a Vulnerability Assessment Tool
5.12 Best Practices for Selecting Vulnerability Assessment Tools
5.13 Common Vulnerability Scoring System (CVSS)
5.13 Common Vulnerability Scoring System (CVSS)
5.14 Common Vulnerabilities and Exposures (CVE)
5.15 National Vulnerability Database (NVD)
5.16 Resources for Vulnerability Research
5.17 Vulnerability Assessment Tools
5.18 Vulnerability Assessment Tools for Mobile
5.19 Vulnerability Assessment Reports
5.20 Analyzing Vulnerability Scanning Report
Quiz Module 05
Section A: Theory-Based Questions
Section B: Practical-Based Questions
Module 06: System Hacking
6.1 CEH Hacking Methodology (CHM)
6.2 System Hacking Goals
6.3 Password Cracking
6.4 Types of Password Attacks
6.5 Password Recovery Tools
6.6 Microsoft Authentication
6.7 How Hash Passwords Are Stored in Windows SAM?
6.8 NTLM Authentication Process
6.9 Kerberos Authentication
6.10 Password Salting
6.11 Tools to Extract the Password Hashes
6.12 Password Cracking Tools
6.13 How to Defend against Password Cracking
6.14 How to Defend against LLMNR/NBT-NS Poisoning
6.15 Privilege Escalation
6.16 Privilege Escalation Using DLL Hijacking
6.17 Privilege Escalation by Exploiting Vulnerabilities
6.18 Privilege Escalation Using Dylib Hijacking
6.19 Privilege Escalation using Spectre and Meltdown Vulnerabilities
6.20 Other Privilege Escalation Techniques
6.21 How to Defend Against Privilege Escalation
6.22 Executing Applications
6.23 Keylogger
6.24 Spyware
6.25 How to Defend Against Keyloggers
6.26 How to Defend Against Spyware
6.27 Rootkits
6.28 NTFS Data Stream
6.29 What is Steganography?
6.30 Covering Tracks
6.31 Disabling Auditing: Auditpol
6.32 Clearing Logs
6.33 Manually Clearing Event Logs
6.34 Ways to Clear Online Tracks
6.35 Covering BASH Shell Tracks
6.36 Covering Tracks on Network
6.37 Covering Tracks on OS
6.38 Covering Tracks Tools
6.39 Password Cracking
6.40 Privilege Escalation
6.41 Executing Applications
6.42 Hiding Files
6.43 Covering Tracks
Quiz Module 06
Answer: a) Modifying system timestamps
Section B: Case Study (10 Marks Each)
Section C: Practical Task (15 Marks)
Section D: Research-Based Questions (10 Marks Each)
Module 07: Malware Threats
7.1 Introduction to Malware
7.2 Different Ways a Malware can Get into a System
7.3 Common Techniques Attackers Use to Distribute Malware on the Web
7.4 Components of Malware
7.5 What is a Trojan?
7.6 How Hackers Use Trojans
7.7 Common Ports used by Trojans
7.8 How to Infect Systems Using a Trojan
7.9 Trojan Horse Construction Kit
7.10 Wrappers
7.11 Crypters
7.12 How Attackers Deploy a Trojan
7.13 Exploit Kits
7.14 Evading Anti-Virus Techniques
7.15 Types of Trojans
7.16 Introduction to Viruses
7.17 Stages of Virus Life
7.18 Working of Viruses
7.19 Indications of Virus Attack
7.20 How does a Computer Get Infected by Viruses
7.21 Virus Hoaxes
7.22 Fake Antiviruses
7.23 Ransomware
7.24 Types of Viruses
7.25 Creating Virus
7.26 Computer Worms
7.27 Worm Makers
7.28 What is Sheep Dip Computer?
7.29 Anti-Virus Sensor Systems
7.30 Introduction to Malware Analysis
7.31 Malware Analysis Procedure: Preparing Testbed
7.32 Static Malware Analysis
7.33 Dynamic Malware Analysis
7.34 Virus Detection Methods
7.35 Trojan Analysis: ZeuS/Zbot
7.36 Virus Analysis: WannaCry
7.37 Trojan Countermeasures
7.38 Backdoor Countermeasures
7.39 Virus and Worms Countermeasures
7.40 Anti-Trojan Software
7.41 Antivirus Software
7.42 Malware Penetration Testing
Module 08: Sniffing
8.1 Network Sniffing
8.2 Types of Sniffing
8.3 How an Attacker Hacks the Network Using Sniffers
8.4 Protocols Vulnerable to Sniffing
8.5 Sniffing in the Data Link Layer of the OSI Model
8.6 Hardware Protocol Analyzers
8.7 SPAN Port
8.8 Wiretapping
8.9 Lawful Interception
8.10 MAC Address/CAM Table
8.11 How CAM Works
8.12 What Happens When CAM Table Is Full?
8.13 MAC Flooding
8.14 Switch Port Stealing
8.15 How to Defend against MAC Attacks
8.16 How DHCP Works
8.17 DHCP Request/Reply Messages
8.18 DHCP Starvation Attack
8.19 Rogue DHCP Server Attack
8.20 How to Defend Against DHCP Starvation and Rogue Server Attack
8.21 What Is Address Resolution Protocol (ARP)?
8.22 ARP Spoofing Attack
8.23 Threats of ARP Poisoning
8.24 ARP Poisoning Tools
8.25 How to Defend Against ARP Poisoning
8.26 Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
8.27 ARP Spoofing Detection Tools
8.28 MAC Spoofing/Duplicating
8.29 MAC Spoofing Technique: Windows
8.30 MAC Spoofing Tools
8.31 IRDP Spoofing
8.32 How to Defend Against MAC Spoofing
8.33 DNS Poisoning Techniques
8.34 How to Defend Against DNS Spoofing
8.35 Sniffing Tool: Wireshark
8.36 Display Filters in Wireshark
8.37 Additional Wireshark Filters
8.38 Sniffing Tools
8.39 Packet Sniffing Tools for Mobile
8.40 How to Defend Against Sniffing
8.41 How to Detect Sniffing
8.42 Sniffer Detection Techniques
8.43 Promiscuous Detection Tools
8.44 Sniffing Penetration Testing
Module 09: Social Engineering
9.1 What is Social Engineering?
9.2 Phases of a Social Engineering Attack
9.3 Types of Social Engineering
9.4 Human-based Social Engineering
9.5 Computer-based Social Engineering
9.6 Mobile-based Social Engineering
9.7 Insider Threat / Insider Attack
9.8 Type of Insider Threats
9.9 Social Engineering Through Impersonation on Social Networking Sites
9.10 Impersonation on Facebook
9.11 Social Networking Threats to Corporate Networks
9.12 Identity Theft
9.13 Social Engineering Countermeasures
9.14 Insider Threats Countermeasures
9.15 Identity Theft Countermeasures
9.16 How to Detect Phishing Emails?
9.17 Anti-Phishing Toolbar
9.18 Common Social Engineering Targets and Defense Strategies
9.19 Social Engineering Pen-Testing
9.20 Social Engineering Pen-Testing Tools
Module 10: Denial-of-Service
10.1 What is a Denial-of-Service Attack?
10.2 What is Distributed Denial-of-Service Attack?
10.3 Basic Categories of DoS/DDoS Attack Vectors
10.4 UDP Flood Attack
10.5 ICMP Flood Attack
10.6 Ping of Death and Smurf Attack
10.7 SYN Flood Attack
10.8 Fragmentation Attack
10.9 HTTP GET/POST and Slowloris Attacks
10.10 Multi-Vector Attack
10.11 Peer-to-Peer Attacks
10.12 Permanent Denial-of-Service Attack
10.13 Distributed Reflection Denial-of-Service (DRDoS)
10.14 Organized Cyber Crime: Organizational Chart
10.15 Botnet
10.16 A Typical Botnet Setup
10.17 Botnet Ecosystem
10.18 Scanning Methods for Finding Vulnerable Machines
10.19 How Malicious Code Propagates?
10.20 Botnet Trojans
10.21 DDoS Attack
10.22 Hackers Advertise Links to Download Botnet
10.23 Use of Mobile Devices as Botnets for Launching DDoS Attacks
10.24 DDoS Case Study: Dyn DDoS Attack
10.25 DoS/DDoS Attack Tools
10.26 DoS and DDoS Attack Tool for Mobile
10.27 Detection Techniques
10.28 DoS/DDoS Countermeasure Strategies
10.29 DDoS Attack Countermeasures
10.30 Techniques to Defend against Botnets
10.31 DoS/DDoS Countermeasures
10.32 DoS/DDoS Protection at ISP Level
10.33 Enabling TCP Intercept on Cisco IOS Software
10.34 Advanced DDoS Protection Appliances
10.35 DoS/DDoS Protection Tools
10.36 Denial-of-Service (DoS) Attack Pen-Testing
Module 11: Session Hijacking
11.1 What is Session Hijacking?
11.2 Why Session Hijacking is Successful?
11.3 Session Hijacking Process
11.4 Packet Analysis of a Local Session Hijack
11.5 Types of Session Hijacking
11.6 Session Hijacking in OSI Model
11.7 Spoofing vs. Hijacking
11.8 Application Level Session Hijacking
11.9 Compromising Session IDs using Sniffing and Predicting Session Token
11.10 Compromising Session IDs Using Man-in-the-Middle Attack
11.11 Compromising Session IDs Using Man-in-the-Browser Attack
11.12 Compromising Session IDs Using Client-side Attacks
11.13 Compromising Session IDs Using Client-side Attacks: Cross-site Script Attack
11.14 Compromising Session IDs Using Client-side Attacks: Cross-site Request Forgery Attack
11.15 Compromising Session IDs Using Session Replay Attack
11.16 Compromising Session IDs Using Session Fixation
11.17 Session Hijacking Using Proxy Servers
11.18 Session Hijacking Using CRIME Attack
11.19 Session Hijacking Using Forbidden Attack
11.20 TCP/IP Hijacking
11.21 IP Spoofing: Source Routed Packets
11.22 RST Hijacking
11.23 Blind Hijacking
11.24 UDP Hijacking
11.25 MiTM Attack Using Forged ICMP and ARP Spoofing
11.26 Session Hijacking Tools
11.27 Session Hijacking Tools for Mobile
11.28 Session Hijacking Detection Methods
11.29 Protecting against Session Hijacking
11.30 Methods to Prevent Session Hijacking: To be Followed by Web Developers
11.31 Methods to Prevent Session Hijacking: To be Followed by Web Users
11.32 Session Hijacking Detection Tools
11.33 Approaches Vulnerable to Session Hijacking and their Preventative Solutions
11.34 Approaches to Prevent Session Hijacking
11.35 IPSec
11.36 Session Hijacking Prevention Tools
11.37 Session Hijacking Pen Testing
Module 12: Evading IDS, Firewalls, and Honeypots
12.1 Intrusion Detection System (IDS)
12.2 Firewall
12.3 Honeypot
12.4 Intrusion Detection Tool
12.5 Firewalls
12.6 Honeypot Tools
12.7 IDS Evasion Techniques
12.8 Firewall Evasion Techniques
12.9 IDS/Firewall Evasion Tools
12.10 Packet Fragment Generator Tools
12.11 Detecting Honeypots
12.12 Detecting and Defeating Honeypots
12.13 Honeypot Detection Tool: Send-Safe Honeypot Hunter
12.14 How to Defend Against IDS Evasion
12.15 How to Defend Against Firewall Evasion
12.16 Firewall/IDS Penetration Testing
Module 13: Hacking Web Servers
13.1 Web Server Operations
13.2 Open Source Web Server Architecture
13.3 IIS Web Server Architecture
13.4 Web Server Security Issue
13.5 Why Web Servers Are Compromised?
13.6 Impact of Web Server Attacks
13.7 DoS/DDoS Attacks
13.8 DNS Server Hijacking
13.9 DNS Amplification Attack
13.10 Directory Traversal Attacks
13.11 Man-in-the-Middle/Sniffing Attack
13.12 Phishing Attacks
13.13 Website Defacement
13.14 Web Server Misconfiguration
13.15 HTTP Response Splitting Attack
13.16 Web Cache Poisoning Attack
13.17 SSH Brute Force Attack
13.18 Web Server Password Cracking
13.19 Web Application Attacks
13.20 Information Gathering
13.21 Web Server Footprinting/Banner Grabbing
13.22 Website Mirroring
13.23 Vulnerability Scanning
13.24 Session Hijacking
13.25 Web Server Passwords Hacking
13.26 Using Application Server as a Proxy
13.27 Metasploit
13.28 Web Server Attack Tools
13.29 Place Web Servers in Separate Secure Server Security Segment on Network
13.30 Countermeasures
13.31 Detecting Web Server Hacking Attempts
13.32 How to Defend Against Web Server Attacks
13.33 How to Defend against HTTP Response Splitting and Web Cache Poisoning
13.34 How to Defend against DNS Hijacking
13.35 Patches and Hotfixes
13.36 What is Patch Management
13.37 Installation of a Patch
13.38 Patch Management Tools
13.39 Web Application Security Scanners
13.40 Web Server Security Scanners
13.40 Web Server Security Scanners
13.41 Web Server Security Tools
13.42 Web Server Penetration Testing
13.43 Web Server Pen-Testing Tools
Module 14: Hacking Web Applications
14.1 Introduction to Web Applications
14.2 Web Application Architecture
14.3 Web 2.0 Applications
14.4 Vulnerability Stack
14.5 OWASP Top 10 Application Security Risks – 2017
14.6 Other Web Application Threats
14.7 Web App Hacking Methodology
14.8 Footprint Web Infrastructure
14.9 Attack Web Servers
14.10 Analyze Web Applications
14.11 Bypass Client-Side Controls
14.12 Attack Authentication Mechanism
14.13 Attack Authorization Schemes
14.14 Attack Access Controls
14.14 Attack Access Controls
14.15 Attack Session Management Mechanism
14.16 Perform Injection/Input Validation Attacks
14.17 Attack Application Logic Flaws
14.18 Attack Database Connectivity
14.19 Attack Web App Client
14.20 Attack Web Services
14.21 Web Application Hacking Tools
14.22 Web Application Fuzz Testing
14.23 Source Code Review
14.24 Encoding Schemes
14.25 How to Defend Against Injection Attacks
14.26 Web Application Attack Countermeasures
14.27 How to Defend Against Web Application Attacks
14.28 Web Application Security Testing Tools
14.29 Web Application Firewal
14.30 Web Application Pen Testing
14.31 Web Application Pen Testing Framework
Module 15: SQL Injection
15.1 What is SQL Injection?
15.2 SQL Injection and Server-side Technologies
15.3 Understanding HTTP POST Request
15.4 Understanding Normal SQL Query
15.5 Understanding an SQL Injection Query
15.6 Understanding an SQL Injection Query – Code Analysis
15.7 Example of a Web Application Vulnerable to SQL Injection: aspx
15.8 Example of a Web Application Vulnerable to SQL Injection: Attack Analysis
15.9 Examples of SQL Injection
15.10 Types of SQL injection
15.11 SQL Injection Methodology
15.12 SQL Injection Tools
15.13 SQL Injection Tools
15.14 SQL Injection Tools for Mobile
15.15 Evading IDS
15.16 Types of Signature Evasion Techniques
15.17 How to Defend Against SQL Injection Attacks
15.18 SQL Injection Detection Tools
15.19 SQL Injection Detection Tools
Module 16: Hacking Wireless Networks
16.1 Wireless Terminologies
16.2 Wireless Networks
16.3 Wireless Standards
16.4 Service Set Identifier (SSID)
16.6 Wi-Fi Authentication Process Using a Centralized Authentication Server
16.7 Types of Wireless Antennas
16.8 Types of Wireless Encryption
16.9 WEP vs. WPA vs. WPA2
16.10 WEP Issues
16.11 Weak Initialization Vectors (IV)
16.12 Wireless Threats
16.13 Wireless Hacking Methodology
16.14 WEP/WPA Cracking Tools
16.15 WEP/WPA Cracking Tool for Mobile
16.16 Wi-Fi Sniffer
16.17 Wi-Fi Traffic Analyzer Tools
16.18 Other Wireless Hacking Tools
16.19 Bluetooth Stack
16.20 Bluetooth Hacking
16.21 Bluetooth Threats
16.22 How to BlueJack a Victim
16.23 Bluetooth Hacking Tools
16.24 Wireless Security Layers
16.25 How to Defend Against WPA/WPA2 Cracking
16.26 How to Defend Against KRACK Attacks
16.27 How to Detect and Block Rogue AP
16.28 How to Defend Against Wireless Attacks
16.29 How to Defend Against Bluetooth Hacking
16.30 Wireless Intrusion Prevention Systems
16.31 Wireless IPS Deployment
16.32 Wi-Fi Security Auditing Tools
16.33 Wi-Fi Intrusion Prevention System
16.34 Wi-Fi Predictive Planning Tools
16.35 Wi-Fi Vulnerability Scanning Tools
16.36 Bluetooth Security Tools
16.37 Wi-Fi Security Tools for Mobile
16.38 Wireless Penetration Testing
16.39 Wireless Penetration Testing Framework
Module 17: Hacking Mobile Platforms
17.1 Vulnerable Areas in Mobile Business Environment
17.2 OWASP Top 10 Mobile Risks – 2016
17.3 Anatomy of a Mobile Attack
17.4 How a Hacker can Profit from Mobile when Successfully Compromised
17.5 Mobile Attack Vectors and Mobile Platform Vulnerabilities
17.6 Security Issues Arising from App Stores
17.7 App Sandboxing Issues
17.8 Mobile Spam
17.9 SMS Phishing Attack (SMiShing) (Targeted Attack Scan)
17.10 Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections
17.11 Android OS
17.12 Android Rooting
17.13 Blocking Wi-Fi Access using NetCut
17.14 Hacking with zANTI
17.15 Hacking Networks Using Network Spoofer
17.16 Launching DoS Attack using Low Orbit Ion Cannon (LOIC)
17.17 Performing Session Hijacking Using DroidSheep
17.18 Hacking with Orbot Proxy
17.19 Android-based Sniffers
17.20 Android Trojans
17.21 Securing Android Devices
17.22 Android Security Tool: Find My Device
17.23 Android Security Tools
17.24 Android Vulnerability Scanner
17.25 Android Device Tracking Tools
17.26 Apple iOS
17.27 Jailbreaking iOS
17.28 iOS Trojans
17.29 Guidelines for Securing iOS Devices
17.30 iOS Device Tracking Tools
17.31 iOS Device Security Tools
17.32 Mobile Spyware
17.33 Mobile Spyware: mSpy
17.34 Mobile Spywares
17.35 Mobile Device Management (MDM)
17.36 Mobile Device Management Solutions
17.37 Bring Your Own Device (BYOD)
17.38 General Guidelines for Mobile Platform Security
17.39 Mobile Device Security Guidelines for Administrator
17.40 SMS Phishing Countermeasures
17.41 Mobile Protection Tools
17.42 Mobile Anti-Spyware
17.43 Android Phone Pen Testing
17.44 iPhone Pen Testing
17.45 Mobile Pen Testing Toolkit: Hackode
Module 18: IoT Hacking
18.1 What is IoT
18.2 How IoT Works
18.3 IoT Architecture
18.4 IoT Application Areas and Devices
18.5 IoT Technologies and Protocols
18.6 IoT Communication Models
18.7 Challenges of IoT
18.8 Threat vs Opportunity
18.9 IoT Security Problems
18.10 OWASP Top 10 IoT Vulnerabilities and Obstacles
18.11 IoT Attack Surface Areas
18.12 IoT Threats
18.13 Hacking IoT Devices: General Scenario
18.14 IoT Attacks
18.15 IoT Attacks in Different Sectors
18.16 Case Study: Dyn Attack
18.17 What is IoT Device Hacking?
18.18 IoT Hacking Methodology
18.19 Information Gathering Tools
18.20 Sniffing Tools
18.21 Vulnerability Scanning Tools
18.22 IoT Hacking Tools
18.23 How to Defend Against IoT Hacking
18.24 General Guidelines for IoT Device Manufacturing Companies
18.25 OWASP Top 10 IoT Vulnerabilities Solutions
18.26 IoT Framework Security Considerations
18.27 IoT Security Tools
18.28 IoT Pen Testing
Module 19: Cloud Computing
19.1 Introduction to Cloud Computing
19.2 Separation of Responsibilities in Cloud
19.3 Cloud Deployment Models
19.4 NIST Cloud Deployment Reference Architecture
19.5 Cloud Computing Benefits
19.6 Understanding Virtualization
19.7 Cloud Computing Threats
19.8 Service Hijacking using Social Engineering Attacks
19.9 Service Hijacking using Network Sniffing
19.9 Service Hijacking using Network Sniffing
19.10 Session Hijacking using XSS Attack
19.11 Session Hijacking using Session Riding
19.12 Domain Name System (DNS) Attacks
19.13 Side-Channel Attacks or Cross-guest VM Breaches
19.14 SQL Injection Attacks
19.15 Cryptanalysis Attacks
19.16 Wrapping Attack
19.17 Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
19.18 Man-in-the-Cloud Attack
19.19 Cloud Security Control Layers
19.20 Cloud Security is the Responsibility of both Cloud Provider and Consumer
19.21 Cloud Computing Security Considerations
19.22 Placement of Security Controls in the Cloud
19.23 Best Practices for Securing Cloud
19.23 Best Practices for Securing Cloud
19.24 NIST Recommendations for Cloud Security
19.25 Organization/Provider Cloud Security Compliance Checklist
19.26 Cloud Security Tools
19.27 What is Cloud Pen Testing?
19.28 Key Considerations for Pen Testing in the Cloud
19.29 Cloud Penetration Testing
19.30 Recommendations for Cloud Testing
Module 20: Cryptography
20.1 Cryptography
20.2 Government Access to Keys (GAK)
20.3 Ciphers
20.4 Data Encryption Standard (DES)
20.5 Advanced Encryption Standard (AES)
20.6 RC4, RC5, and RC6 Algorithms
20.7 Twofish
20.8 The DSA and Related Signature Schemes
20.9 Rivest Shamir Adleman (RSA)
20.10 Diffie-Hellman
20.11 Message Digest (One-Way Hash) Functions
20.12 MD5 Hash Calculators
20.13 Hash Calculators for Mobile
20.14 Cryptography Tools
20.15 Cryptography Tools for Mobile
20.16 Public Key Infrastructure (PKI)
20.17 Digital Signature
20.18 Secure Sockets Layer (SSL)
20.19 Transport Layer Security (TLS)
20.20 Cryptography Toolkit
20.21 Pretty Good Privacy (PGP)
20.22 Disk Encryption
20.23 Disk Encryption Tools
20.24 Cryptanalysis Methods
20.25 Code Breaking Methodologies
20.26 Cryptography Attacks
20.27 Cryptanalysis Tools
20.28 Online MD5 Decryption Tools
20.29 How to Defend Against Cryptographic Attacks
Earn a certificate
Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.
