SlideShare a Scribd company logo
1 of 13
Ethical Hacking
security seen from an offensive perspective
Gabriel Avramescu
CEI, CEH, ECSA, OSCP, ISO 27001 Lead Auditor,
CREST CRT, CCNA SECURITY
BEFORE TAKING THIS COURSE, STUDENTS
SHOULD
• Basic Computer Networking, OS and Web concepts
1
Course learning objectives
• Develop ”Out-of-box” thinking
• See security from an offensive perspective
2
Course learning modules
• Penetration testing overview
• Various types of footprinting, footprinting tools, and
countermeasures
• Network scanning techniques and scanning
countermeasures
• Enumeration techniques and enumeration
countermeasures
• System hacking methodology
• Different types of Trojans, Trojan analysis, and Trojan
countermeasures
• Packet sniffng techniques and how to defend against
sniffing, session hijacking
3
• Social Engineering techniques, identify theft,
and social engineering countermeasures
• Different types of webserver attacks, attack
methodology, and countermeasures
• Different types of web application attacks, web
application hacking methodology, and
countermeasures
• Wireless Encryption, wireless hacking
methodology, wireless hacking tools, and wi-
security tools
• Different types of cryptography ciphers, Public
Key Infrastructure (PKI), cryptography attacks,
and cryptanalysis tools
Practice, practice, practice …
• Damn Vulnerable Web Application, WebGoat, Metasploit - Rings a bell?
• Networking, Metasploit demos- to see the importance of servers upgrade
• Attacker's mindset: "what an attacker would do?"
• Demos, demos, demos (practice vs theory)
4
About your trainer
• Penetration Tester and Security Consultant
• Trainer, Speaker
• Certifications: CEI, CEH, ECSA, OSCP, ISO 27001 Lead
Auditor, CREST CRT, CCNA SECURITY, etc.
• Email: gabriel.avramescu@ituniversity.ro
5
Introductions
• Name
• Company
• Your job role
• Your current experience, certifications
• Do you meet the course prerequisites?
• What you expect from this class
6
Day 1
1. Introduction to Ethical Hacking
2. Information Gathering - Footprinting, Reconnaissance
3. Scanning, Enumeration
4. System Hacking
5. Malware Threats
6. Sniffing and Session Hijacking
7
Day 2
7. Social Engineering
8. Hacking Web Applications and Web Servers
9. Cryptography
10. Hacking Wireless Networks
8
Environment
Materials for:
• Theory
• Practice
• Videos
9
For labs virtual machine with:
• Two Virtual Machines
• Kali Linux With Nessus
• Metasploitable VM with different
vulnerabilities
Administrative Items
• Course environment
• Materials in your student packet
• Lab exercise procedures
• Topics not on the agenda
• Evaluations
• Restrooms
• Fire exits
10
Logistics
Program: 09:00 – 17:00
Morning
• 10 minutes breaks
Lunch
• 1 hour
Afternoon
• 2 x 10 minutes breaks
11
THANK YOU!

More Related Content

Similar to !0. Ethical Hacking_overview.pptx

Ethical Hacking Workshop.pptx
Ethical Hacking Workshop.pptxEthical Hacking Workshop.pptx
Ethical Hacking Workshop.pptxCS50Bootcamp
 
The_Pentester_Blueprint.pdf
The_Pentester_Blueprint.pdfThe_Pentester_Blueprint.pdf
The_Pentester_Blueprint.pdfgcara4
 
Ethical Hacking Cehv7 Course Overview Presentation
Ethical Hacking Cehv7 Course  Overview Presentation Ethical Hacking Cehv7 Course  Overview Presentation
Ethical Hacking Cehv7 Course Overview Presentation Prabh Jeet
 
The future of cloud security
The future of cloud securityThe future of cloud security
The future of cloud securityPeter Wood
 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical HackerPiotrPatun
 
WTF is Penetration Testing
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration TestingScott Sutherland
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011Xavier Mertens
 
Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma begmohsin
 
WTF is Penetration Testing
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration TestingNetSPI
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineNYU Tandon Online
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUNYU Tandon Online
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
Session on Cyber security and Ethical Hacking.pptx
Session on Cyber security and Ethical Hacking.pptxSession on Cyber security and Ethical Hacking.pptx
Session on Cyber security and Ethical Hacking.pptxVicky Tyagi
 

Similar to !0. Ethical Hacking_overview.pptx (20)

Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Ethical Hacking Workshop.pptx
Ethical Hacking Workshop.pptxEthical Hacking Workshop.pptx
Ethical Hacking Workshop.pptx
 
The_Pentester_Blueprint.pdf
The_Pentester_Blueprint.pdfThe_Pentester_Blueprint.pdf
The_Pentester_Blueprint.pdf
 
Ethical Hacking Cehv7 Course Overview Presentation
Ethical Hacking Cehv7 Course  Overview Presentation Ethical Hacking Cehv7 Course  Overview Presentation
Ethical Hacking Cehv7 Course Overview Presentation
 
The future of cloud security
The future of cloud securityThe future of cloud security
The future of cloud security
 
MyResume.pdf
MyResume.pdfMyResume.pdf
MyResume.pdf
 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical Hacker
 
WTF is Penetration Testing
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration Testing
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
WTF is Penetration Testing
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration Testing
 
CEH.pptx
CEH.pptxCEH.pptx
CEH.pptx
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Session on Cyber security and Ethical Hacking.pptx
Session on Cyber security and Ethical Hacking.pptxSession on Cyber security and Ethical Hacking.pptx
Session on Cyber security and Ethical Hacking.pptx
 

Recently uploaded

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 

Recently uploaded (20)

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 

!0. Ethical Hacking_overview.pptx

  • 1. Ethical Hacking security seen from an offensive perspective Gabriel Avramescu CEI, CEH, ECSA, OSCP, ISO 27001 Lead Auditor, CREST CRT, CCNA SECURITY
  • 2. BEFORE TAKING THIS COURSE, STUDENTS SHOULD • Basic Computer Networking, OS and Web concepts 1
  • 3. Course learning objectives • Develop ”Out-of-box” thinking • See security from an offensive perspective 2
  • 4. Course learning modules • Penetration testing overview • Various types of footprinting, footprinting tools, and countermeasures • Network scanning techniques and scanning countermeasures • Enumeration techniques and enumeration countermeasures • System hacking methodology • Different types of Trojans, Trojan analysis, and Trojan countermeasures • Packet sniffng techniques and how to defend against sniffing, session hijacking 3 • Social Engineering techniques, identify theft, and social engineering countermeasures • Different types of webserver attacks, attack methodology, and countermeasures • Different types of web application attacks, web application hacking methodology, and countermeasures • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • 5. Practice, practice, practice … • Damn Vulnerable Web Application, WebGoat, Metasploit - Rings a bell? • Networking, Metasploit demos- to see the importance of servers upgrade • Attacker's mindset: "what an attacker would do?" • Demos, demos, demos (practice vs theory) 4
  • 6. About your trainer • Penetration Tester and Security Consultant • Trainer, Speaker • Certifications: CEI, CEH, ECSA, OSCP, ISO 27001 Lead Auditor, CREST CRT, CCNA SECURITY, etc. • Email: gabriel.avramescu@ituniversity.ro 5
  • 7. Introductions • Name • Company • Your job role • Your current experience, certifications • Do you meet the course prerequisites? • What you expect from this class 6
  • 8. Day 1 1. Introduction to Ethical Hacking 2. Information Gathering - Footprinting, Reconnaissance 3. Scanning, Enumeration 4. System Hacking 5. Malware Threats 6. Sniffing and Session Hijacking 7
  • 9. Day 2 7. Social Engineering 8. Hacking Web Applications and Web Servers 9. Cryptography 10. Hacking Wireless Networks 8
  • 10. Environment Materials for: • Theory • Practice • Videos 9 For labs virtual machine with: • Two Virtual Machines • Kali Linux With Nessus • Metasploitable VM with different vulnerabilities
  • 11. Administrative Items • Course environment • Materials in your student packet • Lab exercise procedures • Topics not on the agenda • Evaluations • Restrooms • Fire exits 10
  • 12. Logistics Program: 09:00 – 17:00 Morning • 10 minutes breaks Lunch • 1 hour Afternoon • 2 x 10 minutes breaks 11