Wisdom of Life

CCAS Certified Ethical Hacking Course

CEH

CCAS Ethical Hacking Course will follow :

Module 01: Networking Concept

  • How does internet work.
  • What is network ?
  • Countermeasures of network.
  • What is IP and? types of IP ?
  • What is Mac ?
  • What is Cookie and Cache ? .
  • Domain Name System
  • DNS Poisoning
  • Name Server
  • Electronic Mail
  • Architecture and Services
  • Mail Access Protocols
  • Introduction of Ports
  • Introduction to Web Browser
  • Detail Study on Buffer or Packets
  • Detail Study on Internet and Intranet
  • Detail Study on Firewall
  • Concept of Routing and Switching

Module 02: Operating System Concept

  • Introduction to Operating System
  • Types of Operating System
  • Bootstrapping Technology
  • Understanding Windows
  • Understanding Tokens
  • Impersonation Tokens
  • Local and Domain Escalation
  • Process Scheduling
  • Concept of ACL

Module 03: Introduction to Ethical Hacking

  • What is Ethical Hacking
  • Types of Hackers
  • Who is a Hacker
  • Security Challenges
  • Scanning
  • Skills required for an Ethical Hacker
  • Types of Attacks
  • What do Ethical Hackers Do
  • Vulnerability Research
  • Effects of Hacking
  • How can Hacking be Ethical
  • Types of Data Stolen from the organisation
  • What is Penetration Testing
  • Penetration Testing Methodlogy

Module 04: Footprinting

  • Footprinting Terminologies
  • What is Footprinting
  • Methods of Footprinting
  • Benefits of Footprinting
  • People Search
  • Who-is-lookup
  • DNS Lookup
  • Analyzing Email Headers
  • Extracting DNs Information
  • Traceroute
  • Mirroring Websites
  • Finding Vulnerable Web-Sites
  • Extracting Website Informations
  • Tracking Users
  • Tracking Emails Communications
  • Tracking Emails Communications
  • Tracking Mobile Communications
  • Mobile Communications Countermeasures
  • Additional Footprinting Tools
  • Complete Study on CCAS Tracing Tools

Module 05: Google Hacking

  • What a hacker Do using Google Hacking
  • Footprinting using Google Hacking Technique
  • Google Advance Search Operators
  • Google Hacking Tools
  • Error Message Queries

Module 06: Scanning Network

  • Network Scanning
  • Types of Scanning
  • Three Way Handshake
  • TCP Communication Flags
  • Hping Commands
  • Scanning Techniques
  • Seaching Vulnerable Systems
  • Complete Study on All CCAS Scanning Tools
  • Operating System Fingerprinting
  • Scanning Countermeasures
  • Securing Network
  • Complete Study on Banner Grabbing
  • Vulnerability Scanning
  • Proxy Servers
  • Use of Proxies
  • Working of Multi Proxies
  • Proxy Tools
  • HTTP Tunnelling Technologies
  • SSH Tunnelling
  • IP Spoofing Detection Technology
  • IP Spoofing Countermeasures
  • Anonymizers
  • Types of Anonymizers
  • Anonymizers Tools

Module 07: System Hacking and Passwords Breaking

  • System Hacking: Goals
  • CCAS Hacking Methodology
  • Password Cracking
    • Password Complexity
    • Password Cracking Techniques
    • Types of Password Attacks
    • Microsoft Authentication
    • How Hash Passwords are Stored in Windows SAM?
    • PWdump7 and Fgdump
    • LazeSoft
    • ?Ophcrack
    • Cain & Abel
    • Detail Study on Password Cracking Tools
    • Privilege Escalation
      • Escalation of Privileges
      • Keylogger
      • Types of Keystroke Loggers
      • Detail Study on Keyloggers and Spywares
      • AntiKeyloggers
      • Spyware
      • Types of Spyware
      • USB Spyware
      • Audio Spyware
      • Email or internet Spyware
      • Antispyware
      • RootKits
      • Types Of RootKits
      • Details Study on Spyware or RootKits
      • AntiRootkits
      • Covering Tracks?

Module 08: Steganography & Cryptography

  • What is Steganography
  • Steganography Techniques
  • How Steganography Works
  • Types of? Steganography
  • Methods of Steganography
  • Steganography Detection Tools

 

  • Cryptography
  • Types of Cryptography
  • Cryptography Techniques
  • What is SSH
  • Cryptography Tools
  • Cryptography Attacks
  • Code Breaking Methodologies

Module 09: Trojans and Backdoors

  • Introductions to Trojans
  • Reasons of Trojans
  • How to use Trojans
  • How Systems get infected? by Trojans
  • Types of Trojans
  • Designing Trojans
  • Removing? Trojans
  • Detail study on Designing and use Trojans
  • Detections Trojans
  • How to create Backdoors
  • Uninstalling Trojans remotely
  • Purpose of Backdoors
  • Study on Anti-Trojan Sofware
  • Backdoor Countermeasures
  • Trojans Countermeasures

Module 10: Viruses & Worms

  • Introduction to Viruses
  • Stages of Viruses Life
  • Working Of Viruses
  • Why Do People Create Computer Viruses
  • Indications of Viruses attack
  • How does a Computer get infected by Viruses
  • Viruses Analysis
  • Types of Viruses
  • Desiging Viruses
  • Computer Worms
  • Worm Maker
  • Worm Analysis
  • Anti-Virus Tools
  • Virus detection methods
  • Virus & Worms Countermeasures

Module 11: Sniffers & Phishing

  • Sniffing Threats
  • How a Sniffer Works
  • What is Address Resolution Protocol (ARP)
  • Types of Sniffing
  • How DHCP works
  • Spoofing Attacks
  • DNS Poisoning
  • Sniffing Tool : WireShark
  • Sniffing Prevention Techniques
  • How to Detect Sniffing

 

  • What is Phishing
  • How Phishing works
  • Types Of Phishing
  • Designing Phishing
  • Detection of Phishing

Module 12: Social Engineering

  • What is Social Engineering
  • Behaviors Vulnerable to attacks
  • Why is Social Engineering Effective
  • Warning Signs of an Attacks
  • Phases in a Social Engineering attack
  • Impact on the Organization
  • Command Injection Attacks
  • Common Targets of Social Engineering
  • Types of Social Engineering
  • Social Engineering Through Impersonation On Social networking Sites
  • Risks of Social Networking to Corporate Networks
  • Social Engineering Countermeasures

Module 13: Denial of Service

  • What is Denial of Service Attack
  • What is Distributed Denial Of Service Attacks
  • Symptoms of DoS atrack
  • Internet Relay Chat (IRC)
  • DoS Attack Techniques
  • Botnet
  • DoS/DDoS Countermeasures
  • Detail Study on DoS attack Tools
  • Detection Techniques

Module 14: Session Hacking

  • What is Session Hijacking
  • Key Session Hijacking Techniques
  • Session Hijacking Process
  • Types of Session Hijacking
  • Session Hijacking Tools
  • Countermeasures
  • Methods to Prevent Session Hijacking
  • Defending Against Session Hijacking Attacks

Module 15: Hacking Web Applications

  • Web Application Security Statistics
  • Introduction to Web Applications
  • Web Application Components
  • How Web Applications Work?
  • Web Application Architecture
  • Injection Flaws
  • What is LDAP Injection?
  • How LDAP Injection Works?
  • Cross-Site Scripting (XSS) Attacks
    • How XSS Attacks Work?
    • Cross-Site Scripting Attack Scenario: Attack via Email
    • XSS Example
    • XSS Cheat Sheet
    • Cross-Site Request Forgery (CSRF) Attack
    • How CSRF Attacks Work?
  • Web Application Denial-of-Service (DoS) Attack
  • Buffer Overflow Attacks
  • Cookie/Session Poisoning
    • How Cookie Poisoning Works?
  • Hacking Web Servers
  • Username Enumeration
  • Password Attacks: Password Functionality Exploits
  • Password Attacks: Password Guessing
  • Password Attacks: Brute-forcing
  • Session Attacks: Session ID Prediction/ Brute-forcing
  • Cookie Exploitation: Cookie Poisoning
  • Encoding Schemes
    • How to Defend Against SQL Injection Attacks?
    • How to Defend Against Command Injection Flaws?
    • How to Defend Against XSS Attacks?
    • How to Defend Against DoS Attack?
    • How to Defend Against Web Services Attack?
  • Web Application Countermeasures
    • Web Application Firewall

Module 16: SQL Injection

  • What is SQL Injection?
  • SQL Injection Attacks
  • How Web Applications Work?
  • SQL Injection Detection
  • Types of SQL Injection
  • What is Blind SQL Injection?
  • SQL Injection Methodology
  • Information Gathering
  • Password Grabbing
    • Grabbing SQL Server Hashes
    • Extracting SQL Hashes (In a Single Statement)
  • SQL Injection Tools
  • How to Defend Against SQL Injection Attacks?
    • How to Defend Against SQL Injection Attacks: Use Type-Safe SQL Parameters

Module 17: Cyber Crime Investigation

  • Introduction to Cyber Crime Investigation.
  • Types of Cyber Crimes.
  • ?Report Cyber Crimes.
  • Investigating Emails (Email Tracing)
  • Online email header analysis.
  • Investigating Phishing Cases.
  • Investigating Data Theft Cases.
  • Investigating Orkut Profile Impersonation Cases.
  • Cyber Law & IT Act, 2000 / 2008.

Module 18: Overview of Linux & Backtrack

  • Introduction of Linux
  • Understanding Linux
  • How Linux Works
  • Introduction of Backtrack
  • Understanding Backtrack
  • How Backtrack Operating System Works
  • Basic Command of Backtrack

 

Enroll Today : Click Here