Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
285
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
10
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Vision for future CEHCourse Description:This class will immerse the student into an interactive environment where they willbe shown how to scan, test, hack and secure their own systems. Students will beginby understanding how perimeter defenses work and then be lead into scanning andattacking their own networks, no real network is harmed. Students then learn howintruders escalate privileges and what steps can be taken to secure a system.Who Should Take This Course?This course will significantly benefit security officers, auditors, securityprofessionals, site administrators, and anyone who is concerned about the integrityof the network infrastructure.CurriculumModule 1: Introduction to Ethical Hacking  Why Security?  The Security, functionality and ease of use Triangle  Can Hacking be Ethical?Module 2: Foot printing  Defining Foot printingModule 3: Scanning  Definition of Scanning.  Types of scanning Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 2. Vision for futureModule 4: Enumeration  What is Enumeration?  NetBios Null SessionsModule 5: System Hacking  Administrator Password Guessing  Manual Password Cracking Algorithm  Automated Password CrackingModule 6: Trojans and Backdoors  Effect on Business  What is a Trojan?Module 7: Sniffers  Definition of sniffing  How a Sniffer works?Module 8: Denial of Service  What is Denial of Service?  Goal of DoS (Denial of Service)Module 9: Social Engineering  What is Social Engineering?  Art of ManipulationModule 10: Session Hijacking  Understanding Session Hijacking Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 3. Vision for future  Spoofing vs Hijacking  How Web Servers Work?Module 11: Hacking Web Servers  How are Web Servers Compromised?Module 12: Web Application Vulnerabilities  Web Application Set-up  Web Application HackingModule 13: Web Based Password Cracking Techniques  Authentication ( Definition – Mechanisms )  HTTP AuthenticationModule 14: SQL Injection  Attacking SQL Servers  SQL Server Resolution Service (SSRS)Module 15: Hacking Wireless Networks  Introduction to Wireless Networking  Business and Wireless AttacksModule 16: Virus  Virus Characteristics  Symptoms of ‘virus-like’ attack Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 4. Vision for futureModule 17: Physical Security  Security statistics  Physical Security breach incidentsModule 18: Linux Hacking  Why Linux?  Linux basicsModule 19: Evading Firewalls, IDS and Honeypots  Intrusion Detection Systems  Ways to Detect IntrusionModule 20: Buffer Overflows  Significance of Buffer Overflow Vulnerability  Why are Programs/Applications Vulnerable?Module 21: Cryptography  Public-key Cryptography  Working of EncryptionModule 22: Penetration Testing Course  Introduction to Penetration Testing (PT)Module 23: Advanced Exploit WritingModule 24: Advanced Covert Hacking TechniquesModule 25: Advanced Virus Writing Techniques Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com