Certified Ethical Hacking Course Starts from 20th Jan 2013

Hack..!

Certified Ethical Hacking Batch is going to Start from 20 January 2013.

Venue  :

313, Gali No. 6, RajaPark, Jaipur, Rajasthan, 302004

Introductory Class : 20/1/2013

Register your seat : Click Here

Course Details :

CCAS Ethical Hacking Course will follow :

Module 01: Networking Concept

 

  • How does Internet Work.

  • What is Network?

  • Countermeasures of Network.

  • What is IP and types

  • Internetworking

  • Domain Name System

    • DNS Poisoning

    • Name Server

    • Resolution Process

    • Electronic Mail

      • Architecture and Services

      • Message Formats

      • Mail access Protocols

      • Ports and Types of Ports

      • Introduction to Web Browser

      • Detail study on Internet and Intranet

      • Detail study on Firewall

       

Module 02: Operating System Concept

 

  • Introduction to Operating System

  • Types of  Operating System

  • Bootstrapping Technology

  • Understanding Windows

  • Understanding Tokens

  • Impersonation Tokens

  • Local and Domain Escalation

  • Process Scheduling

  • Understanding Linux

  • Overview of Linux and Windows File System

 

Module 03: Introduction to Ethical Hacking

 

  • What is Ethical Hacking

  • Types of Hackers

  • Who is a Hacker

  • Security Challenges

  • Scanning

  • Skills required for an Ethical Hacker

  • Types of Attacks

  • What do Ethical Hackers Do

  • Vulnerability Research

  • Effects of Hacking

  • How can Hacking be Ethical

  • Types of Data Stolen from the organisation

  • What is Penetration Testing

  • Penetration Testing Methodlogy

 

Module 04: Footprinting

 

  • Footprinting Terminologies

  • What is Footprinting.

  • Methods of Footprinting.

  • Benefits of Footprinting

  • People Search

  • Who-is Lookup

  • DNS Lookup

  • Analyzing Email Headers

  • Extracting DNs Information

  • Traceroute

  • Complete Study on CCAS Tracing Tools

  • Google Hacking Techniques

  • Finding Vulnerable Web-Sites

  • Google Hacking Tools

  • Extracting Website Information

  • Tracking Users

  • Tracking Emails Communications

  • Tracking Mobile Communications

  • Mobile Communication Countermeasures

 

Module 05: Scanning Network

 

  • Network Scanning

  • Types of Scanning

  • Scanning Techniques

  • Searching Vulnerable Systems

  • Complete Study on all CCAS Scanning Tools

  • Operating System Fingerprinting

  • Scanning Countermeasures

  • Securing Network

  • Complete Study on Banner Grabbing

  • Proxy Servers

  • Use of Proxies

  • Working of Multi Proxies

  • HTTP Tunnelling Technologies

  • SSH Tunnelling

  • Proxy Tools

  • IP Spoofing Detection Technology

  • IP Spoofing Countermeasures

 

Module 06: Enumeration

  • What is enumeration

  • Techniques for Enumeration

  • NetBIOS Enumeration

  • NetBIOS Enumerations Tools

  • Management Information Base

  • Complete Study on SNMP Enumeration Tool

 

Module 07: System Hacking and Passwords Breaking

 

  • System Hacking: Goals

  • CCAS Hacking Methodology

  • Password Cracking

    • Password Complexity

    • Password Cracking Techniques

    • Types of Password Attacks

    • Microsoft Authentication

    • How Hash Passwords are Stored in Windows SAM?

    • PWdump7 and Fgdump

    • L0phtCrack

    • Ophcrack

    • Cain & Abel

    • Detail Study on Password Cracking Tools

    • Privilege Escalation

      • Escalation of Privileges

      • Keylogger

      • Types of Keystroke Loggers

      • Detail Study on Keyloggers and Spywares

      • What is Steganography?

        • Steganography Techniques

        • How Steganography Works?

        • Types of SteganographyMethods of Stegnography

          • Whitespace Steganography Tool: SNOW

 

Module 08: Trojans and Backdoors

 

  • Introduction to Trojans

  • Reason of Trojans

  • How to use Trojans

  • How system get infected by Trojans

  • Types of Trojans

  • Designing Trojans

  • Removing Trojans

  • Detail Study on designing and use various

  • Detecting Trojans

  • How to create Backdoors

  • Uninstalling Trojans remotely

  • Purpose of Backdoors

  • Study on Anti-Trojan Softwares

 

Module 09: Viruses and Sniffers

 

  • Introduction to Viruses

  • Stages of Virus Life

  • Working of  Viruses:

  • Why Do People Create Computer Viruses?

  • Indications of Virus Attack

  • How does a Computer get infected by Viruses?

  • Types of Viruses

  • Designing Viruses

  • Computer  Worms

  • Anti-virus Tools

  • How a Sniffer Works?

  •  What is Address Resolution Protocol (ARP)?

  •  Sniffing Tool: Wireshark

  • Sniffing Prevention Techniques

  • How to Detect Sniffing?

 

Module 10: Social Engineering

 

  • What is Social Engineering?

  • Behaviors Vulnerable to Attacks

  • Why is Social Engineering Effective?

  • Warning Signs of an Attack

  • Phases in a Social Engineering Attack

  • Impact on the Organization

  • Command Injection Attacks

  • Common Targets of Social Engineering

  • Types of Social Engineering

  • Social Engineering Through Impersonation on Social Networking Sites

  • Risks of Social Networking to Corporate Networks

  • Social Engineering Countermeasures

  • How to Detect Phishing Emails?

 

Module 11: Denial of Service

 

  • What is a Denial of Service Attack?

  • What is Distributed Denial of Service Attacks?

  • Internet Relay Chat (IRC)

  • DoS Attack Techniques

  • Detail Study on DoS Attack Tools

  • Detection Techniques

 

Module 12: Hacking Web Applications

 

  • Web Application Security Statistics

  • Introduction to Web Applications

  • Web Application Components

  • How Web Applications Work?

  • Web Application Architecture

  • Injection Flaws

  • What is LDAP Injection?

  • How LDAP Injection Works?

  • Cross-Site Scripting (XSS) AttacksWeb Application Denial-of-Service (DoS) Attack

    • How XSS Attacks Work?

    • Cross-Site Scripting Attack Scenario: Attack via Email

    • XSS Example

    • XSS Cheat Sheet

    • Cross-Site Request Forgery (CSRF) Attack

    • How CSRF Attacks Work?

  • Buffer Overflow Attacks

  • Cookie/Session PoisoningHacking Web Servers

    • How Cookie Poisoning Works?

  • Username Enumeration

  • Password Attacks: Password Functionality Exploits

  • Password Attacks: Password Guessing

  • Password Attacks: Brute-forcing

  • Session Attacks: Session ID Prediction/ Brute-forcing

  • Cookie Exploitation: Cookie Poisoning

  • Encoding Schemes

    • How to Defend Against SQL Injection Attacks?

    • How to Defend Against Command Injection Flaws?

    • How to Defend Against XSS Attacks?

    • How to Defend Against DoS Attack?

    • How to Defend Against Web Services Attack?

  • Web Application Countermeasures

    • Web Application Firewall

 

­­Module 13: SQL Injection

 

  • What is SQL Injection?

  • SQL Injection Attacks

  • How Web Applications Work?

  • SQL Injection Detection

  • Types of SQL Injection

  • What is Blind SQL Injection?

  • SQL Injection Methodology

  • Information Gathering

  • Password GrabbingSQL Injection Tools

    • Grabbing SQL Server Hashes

    • Extracting SQL Hashes (In a Single Statement)

  • How to Defend Against SQL Injection Attacks?

    • How to Defend Against SQL Injection Attacks: Use Type-Safe SQL Parameters

 

Module 14: Cyber Crime Investigation

  • Introduction to Cyber Crime Investigation.

  • Types of Cyber Crimes.

  •  Report Cyber Crimes.

  • Investigating Emails (Email Tracing)

  • Online email header analysis.

  • Investigating Phishing Cases.

  • Investigating Data Theft Cases.

  • Investigating Orkut Profile Impersonation Cases.

  • Cyber Law & IT Act, 2000.

 

Benefit of Course

The main benefits of ethical hacking courses include practicing ethical hacking for a company so that they do not lose any confidential information and other important data to malicious hackers. There are many more benefits also which are mentioned below:

A successful career is made by students who have done a good ethical hacking course. They can work for big IT companies and many other corporate firms. Since the number of companies employing ethical hackers or white hat hackers, as they are commonly known as, has increased in the recent times, the future of a student of such a course is bright as well. The reason for so many companies opting for ethical hackers is the breach of safety these days. The biggest solution to security breach into important information is only to hire an ethical hacker.

Other than benefiting the corporate and IT firms in maintenance of security at their places, the courses will benefit the students alike. The students will be taught how to adapt to the ever evolving demands of the environment. Thus, they would know that updates are happening and they will accordingly keep updating the environment for protection. This will enhance their careers. Whether it is something new in techniques, CPT attacks or countermeasures, the ethical hacking courses cover almost everything these days ensuring that the students are capable of working with greatest security professionals from all over the world.

 

Who Should Attend

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

 

Duration 

40 days to 50 days

 

Certification

CCAS Certified Ethical Hacker Exam maybe taken after 1 month of the completion of course.

 

Outline

Course will be conducted by very well known Cyber Crime Investigator Mr. Milind Agarwal, who is working for Rajasthan Police from last 3 years and having wide knowledge in field of Ethical Hacking.

Facebook