Ethical Hacking and Security Certification

839 views

Published on

Vskills certification for Ethical Hacking and Security Professional assesses the candidate for testing and managing company’s information security. The certification tests the candidates on various areas in ethical hacking and security which includes knowledge of ethics and countermeasures for attacks on system, network (wired and wireless), operating system (Windows and Linux) and web based attacks.

http://www.vskills.in/certification/Certified-Ethical-Hacking-and-Security-Professional

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
839
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
65
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ethical Hacking and Security Certification

  1. 1. Certified Ethical Hacking and Security Professional VS-1078
  2. 2. Certified Ethical Hacking and Security Professional www.vskills.in CCCCertifiedertifiedertifiedertified Ethical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and Security ProfessionalProfessionalProfessionalProfessional Certification CodeCertification CodeCertification CodeCertification Code VS-1078 Vskills certification for Ethical Hacking and Security Professional assesses the candidate for testing and managing company’s information security. The certification tests the candidates on various areas in ethical hacking and security which includes knowledge of ethics and countermeasures for attacks on system, network (wired and wireless), operating system (Windows and Linux) and web based attacks. Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification? This Course is intended for professionals and graduates wanting to excel in their chosen areas. It is also well suited for those who are already working and would like to take certification for further career progression. Earning Vskills Ethical Hacking and Security Professional Certification can help candidate differentiate in today's competitive job market, broaden their employment opportunities by displaying their advanced skills, and result in higher earning potential. Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification? Job seekers looking to find employment in IT or information security department of various companies, students generally wanting to improve their skill set and make their CV stronger and existing employees looking for a better role can prove their employers the value of their skills through this certification Test DetailsTest DetailsTest DetailsTest Details • Duration:Duration:Duration:Duration: 60 minutes • No. of questions:No. of questions:No. of questions:No. of questions: 50 • Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%) There is no negative marking in this module. FFFFee Structureee Structureee Structureee Structure Rs. 4,500/- (Includes all taxes) CompaniesCompaniesCompaniesCompanies that hire Vskills Certifiedthat hire Vskills Certifiedthat hire Vskills Certifiedthat hire Vskills Certified Ethical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and Security ProfessionalProfessionalProfessionalProfessional Ethical Hacking and Security professionals are in great demand. Private and public companies are constantly hiring knowledgeable professionals for their testing and management of information security measures for a secured environment.
  3. 3. Certified Ethical Hacking and Security Professional www.vskills.in Table of Contents 1.1.1.1. IntroductionIntroductionIntroductionIntroduction 1.1 Ethical Hacking Evolution and Hacktivism 1.2 Need and Technical Terms 1.3 Skills Needed and Stages of Hacking 1.4 Ethical Hacking Modes 1.5 Networking Basics 1.6 Penetration Testing 2.2.2.2. EthicsEthicsEthicsEthics 2.1 Moral Direction and Hacker Ethics Principles 2.2 Security Grey Areas 2.3 Cyber Laws (IT Act, etc.) 2.4 Rules of Engagement 3.3.3.3. CryptographyCryptographyCryptographyCryptography 3.1 Cryptography Basics 3.2 Evolution and Data Encryption Methods 3.3 Symmetric and Asymmetric key Cryptography 3.4 Private and Public Key Exchange 3.5 Stream and Block Ciphers 3.6 Secret Key Cryptography 3.7 Message Authentication and Hash Functions 3.8 Digital Signatures and Public Key Infrastructure 4.4.4.4. FootprintingFootprintingFootprintingFootprinting 4.1 Information Gathering 4.2 DNS, whois and ARIN records 4.3 Using traceroute, e-mail tracking and web spider 4.4 Google Hacking 5.5.5.5. Social EngineeringSocial EngineeringSocial EngineeringSocial Engineering 5.1 Social Engineering Concepts 5.2 Social Engineering Attack Types 5.3 Countermeasures for Social Engineering 6.6.6.6. Physical SecurityPhysical SecurityPhysical SecurityPhysical Security 6.1 Basics and Need 6.2 Physical Security Countermeasures 7.7.7.7. Network Scanning and EnumerationNetwork Scanning and EnumerationNetwork Scanning and EnumerationNetwork Scanning and Enumeration 7.1 Network Scanning Techniques 7.2 Scanners and Analyzers
  4. 4. Certified Ethical Hacking and Security Professional www.vskills.in 7.3 HTTP tunneling and IP spoofing 7.4 Enumerating null sessions and SNMP enumeration 8.8.8.8. Network AttacksNetwork AttacksNetwork AttacksNetwork Attacks 8.1 TCP/IP Packet Formats and Ports 8.2 Firewall and IDS 8.3 Switch Attacks 8.4 Router Attacks 8.5 DoS, DDoS, Session Hijacking 9.9.9.9. Wireless NetworksWireless NetworksWireless NetworksWireless Networks 9.1 Wireless LAN Basics 9.2 WLAN Security 9.3 WLAN Attacks 9.4 WLAN Attack Countermeasures 10.10.10.10. System HackingSystem HackingSystem HackingSystem Hacking 10.1 Password Attacks, Vulnerabilities and Countermeasure 10.2 Spyware 10.3 Rootkit 10.4 Steganography 10.5 Trojans 10.6 Computer worm 10.7 Backdoor 10.8 Buffer Overflow 11.11.11.11. Windows HackingWindows HackingWindows HackingWindows Hacking 11.1 Memory and Process 11.2 Windows Architecture 11.3 Windows Security 11.4 Windows Attacks 11.5 Countermeasures 11.6 Windows Memory Protection, SEH and OllyDbg 12.12.12.12. Linux HackingLinux HackingLinux HackingLinux Hacking 12.1 Linux Basics 12.2 Linux Threats 12.3 Linux Security 12.4 Kernel Patching 13.13.13.13. Web HackingWeb HackingWeb HackingWeb Hacking 13.1 Web Basics 13.2 Web Server Attacks 13.3 Web Application Attacks 13.4 VoIP Attacks
  5. 5. Certified Ethical Hacking and Security Professional www.vskills.in 14.14.14.14. Emerging TrendsEmerging TrendsEmerging TrendsEmerging Trends 14.1 Cloud Computing and Security 14.2 Identity Access Management 14.3 Security Policies 14.4 Mobile Security 14.5 New Threats
  6. 6. Certified Ethical Hacking and Security Professional www.vskills.in Sample QuestionsSample QuestionsSample QuestionsSample Questions 1.1.1.1. TheTheTheThe term DDoS expands toterm DDoS expands toterm DDoS expands toterm DDoS expands to _______._______._______._______. A. Divisive Denial of Service B. Distributed Denial of Service C. Detailed Denial of Service D. None of the above 2222. The. The. The. The software Metasploit is used for _______.software Metasploit is used for _______.software Metasploit is used for _______.software Metasploit is used for _______. A. Anti-virus B. Vulnerability Assessment C. Anti-malware D. None of the above 3333. The. The. The. The term XSS refers toterm XSS refers toterm XSS refers toterm XSS refers to _______._______._______._______. A. eXtended Site Scripting B. eXtreme Secured Services C. Cross site scripting D. None of the above 4444. The. The. The. The tool OllDbg is used for analyzing code for which operating system _______.tool OllDbg is used for analyzing code for which operating system _______.tool OllDbg is used for analyzing code for which operating system _______.tool OllDbg is used for analyzing code for which operating system _______. A. Microsoft Windows B. Linux C. Macintosh D. None of the above 5555. The. The. The. The operating system back track is used foroperating system back track is used foroperating system back track is used foroperating system back track is used for _______._______._______._______. A. Penetration testing B. Virus scanning and removal C. Malware scanning and removal D. None of the above Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)

×