COURSE CONTENT
 Introduction to Ethical
Hacking.
 Linux.
 Reconnaissance.
 Google Hacking.
 Scanning.
 Enumeration.
 System Hacking.
 Proxies Servers.
 Key loggers.
 Trojans and Backdoors.
 Viruses and Worms.
 Sniffing.
 Social Engineering.
 Email Hacking and
Countermeasures.
 Session Hijacking.
 Hacking Web servers and
Countermeasures.
 SQL Injection.
 XSS Attacks (Cross-site
Scripting).
 DOS and DDOS attack.
 RFI and LFI.
 Exploits Writing.
 Buffer Overflows.
 Reverse Engineering.
 Cryptography.
 Firewalls.
 Physical Security.
 Hacking Wireless Networks.
 Physical Security.
 Metasploit.
 Physical Security.
 Router Hacking
 Penetration Testing.
 Mobile Hacking.
 Introduction to Cyber
Forensics.
 Introduction to Web
Application Penetration
Testing.

Ethical hacking ppt

  • 1.
  • 2.
     Introduction toEthical Hacking.  Linux.  Reconnaissance.  Google Hacking.  Scanning.
  • 3.
     Enumeration.  SystemHacking.  Proxies Servers.  Key loggers.  Trojans and Backdoors.  Viruses and Worms.
  • 4.
     Sniffing.  SocialEngineering.  Email Hacking and Countermeasures.  Session Hijacking.  Hacking Web servers and Countermeasures.  SQL Injection.
  • 5.
     XSS Attacks(Cross-site Scripting).  DOS and DDOS attack.  RFI and LFI.  Exploits Writing.  Buffer Overflows.  Reverse Engineering.
  • 6.
     Cryptography.  Firewalls. Physical Security.  Hacking Wireless Networks.  Physical Security.  Metasploit.
  • 7.
     Physical Security. Router Hacking  Penetration Testing.  Mobile Hacking.  Introduction to Cyber Forensics.  Introduction to Web Application Penetration Testing.