Search
Generic filters
Topics
Certifications
Industries
course information

This course teaches you the concepts of information and offensive security which are essential to safeguard the security of an enterprise or a personal network. The threats which the world is facing due to the hackers are getting worst day to day. In order to safeguard the data the organizations need ethical hackers who perform a security assessment and take care of the organizational security.

The course covers the major terminologies of offensive security and Enterprise policies, procedures and how CIA is important. Risk assessment, incident response. And the major 5 phases of hacking which covers information gathering, Scanning networks, Gaining access, Maintaining access, Clearing tracks, Malware, Malware analysis, Sniffing, Social engineering, DOs attacks, wireless concepts and web security.

course objectives
  • Understand the network functioning in real-time
  • How the data travels and stolen
  • How sniffing of the data done and how to secure it
  • Securing the infrastructure.
  • Penetration testing mechanism.
  • Open source information gathering and identify the traces
  • Usage of metasploit and OSINT Framework
  • Identifying the target vulnerabilities and safeguard the data
  • Scanning procedures on the target using the professional level tools and using the vulnerability exploitation methods.
  • Performing the assessment on a web infrastructure and identifying the vulnerabilities
  • Wireless attacks and safeguarding
  • Performing SQL injection and gathering formation from databases
course outline

Module 1: Introduction to cyber security

  • Information security overview
  • Elements of Information Security
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Penetration Testing Concept
  • Information Security Laws and Standards

 

Module 2: Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting through Search Engines and web services
  • Footprinting through Social Networking Sites
  • Email Footprinting
  • Competitive Intelligence
  • Whois Footprinting
  • DNs and Network Whois Footprinting
  • Footprinting through Social Engineering

 

Module 3: Scanning Networks

  • Network Scanning Concept
  • Overview of Network Scanning
  • TCP Communication Flags
  • TCP/IP Communication
  • Scanning Techniques
  • Port Scanning Countermeasures
  • Scanning Beyond IDS and Firewall
  • IDS/Firewall Evasion Techniques

 

Module 4: Enumeration

  • Enumeration Concepts
  • What is Enumeration?
  • Techniques for Enumeration
  • Services and Ports to Enumerate

 

 

 

 

 

Module 5: Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability Research
  • Vulnerability Classification
  • What is Vulnerability Assessment
  • Types of Vulnerability Assessment
  • Vulnerability-Management Life Cycle
  • Choosing a Vulnerability Assessment Tool
  • Criteria for Choosing a Vulnerability Assessment Tool

 

Module 6: System Hacking

  • System Hacking Concepts
  • System Hacking Goals
  • Cracking Passwords
  • Password Cracking
  • Privilege esclation
  • Keyloggers
  • Spyware
  • Hiding files
  • Covering tracks

 

Module 7: Malware Threats

  • Covering tracks
  • Malware Concepts
  • Introduction to Malware
  • Different Ways a Malware can Get into a System
  • Common Techniques Attackers Use to
  • Distribute Malware on the Web
  • Components of Malware
  • Trojan Concepts
  • Virus and Worm Concepts
  • computer worms
  • Malware analysis
  • Anti-malware software

 

Module 8: Sniffing

  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks

 

  • ARP Poisoning
  • Spoofing Attacks
  • DNS Poisoning
  • Countermeasures

 

Module 9: Social Engineering

  • Social Engineering Concepts
  • Computer-based Social Engineering
  • Mobile-based Social Engineering
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Countermeasures

 

Module 10: Denial-of-Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DDoS Attack
  • Detection Techniques
  • DoS/DDoS Countermeasure Strategies
  • DDoS Attack Countermeasures
  • DoS/DDoS Protection Tools

 

Module 11: Session Hijacking

  • Session Hijacking Concepts
  • What is Session Hijacking?
  • Why Session Hijacking is Successful?
  • Session Hijacking Process
  • Packet Analysis of a Local Session Hijack
  • Types of Session Hijacking
  • Session Hijacking in OSI Model
  • Spoofing vs. Hijacking
  • Compromising Session IDs using Sniffing and by Predicting Session Token
  • Session Hijacking Tools
  • Methods to Prevent Session Hijacking

 

Module 12: Evading IDS, Firewalls, and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • Intrusion Detection System (IDS)

 

 

  • How IDS Detects an Intrusion
  • Firewall
  • Honeypot
  • IDS Evasion Techniques
  • Firewall Evasion Technique

 

Module 13: Hacking Web Servers

  • Web Server Concepts
  • Web Server Operations
  • Open Source Web Server Architecture
  • IIS Web Server Architecture
  • Web Server Security Issue
  • Why Web Servers Are Compromised?
  • Impact of Web Server Attacks
  • Web Server Attacks
  • Web Server Attack Methodology
  • Countermeasures
  • Patch Management Tools
  • Web Application Security Scanners

 

Module 14: Hacking Web Applications

  • Web App Concepts
  • Introduction to Web Applications
  • Web Application Architecture
  • OWASP Top 10 Application Security Risks –2017
  • Testing for SQL Injection
  • Additional Methods to Detect SQL Injection
  • Perform Union SQL Injection

 

Module 15: SQL INJECTION

  • Testing for SQL Injection
  • Additional Methods to Detect SQL Injection
  • Perform Union SQL Injection
  • Blind SQL injection
  • SQL Countermeasures

 

Module 16: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Terminologies
  • Wireless Networks
  • Wireless Standards
  • service Set Identifier (SSID)
  • Wi-Fi Authentication Modes
  • Wi-Fi Authentication Process Using a
  • Centralized Authentication Server
  • Types of Wireless Antennas
  • Wireless Encryption

 

 

  • Types of Wireless Encryption
  • wireless Threats
  • Wireless Hacking Methodology
  • Wi-Fi Discovery Tools
  • Wireless Traffic Analysis
  • Choosing the Right Wi-Fi Card
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures

 

Module 17: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Vulnerable Areas in Mobile Business Environment
  • OWASP Top 10 Mobile Risks – 2016
  • Anatomy of a Mobile Attack
  • How a Hacker can Profit from Mobile when Successfully Compromised
  • Mobile Attack Vectors and Mobile Platform Vulnerabilities
  • Security Issues Arising from App Stores
  • Hacking Android OS
  • Android OS
  • Android Rooting
  • Android Rooting Tools
  • Jailbreaking iOS
  • Mobile Spyware
  • Mobile Device Management (MDM)
  • Mobile Device Management Solutions
  • Bring Your Own Device (BYOD)

 

Module 18: IoT Hacking (only Theory)

  • IoT Concepts
  • What is IoT
  • How IoT Works
  • IoT Architecture

 

 

  • IoT Application Areas and Devices
  • IoT Technologies and Protocols
  • IoT Communication Models
  • OWASP Top 10 IoT Vulnerabilities and Obstacles
  • IoT Attack Surface Areas
  • IoT Security Tools

 

 

Module 19: Cloud computing (only theory)

  • Cloud Computing Concepts
  • Introduction to Cloud Computing
  • Separation of Responsibilities in Cloud Cloud Deployment Models
  • NIST Cloud Deployment Reference Architecture
  • Cloud Computing Benefits
  • Understanding Virtualization
  • Cloud Computing Threats
  • Cloud Security
  • NIST Recommendations for Cloud Security
  • Cloud Security Tools

 

Module 20: Cryptography

  • Cryptography
  • Concepts Cryptography
  • Types of Cryptography
  • Government Access to Keys (GAK)
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Digital Signature
  • Cryptanalysis
  • Countermeasures

Q1: 16 February 2020
Q2: 12 April 2020
Q3: 9 August 2020
Q4: 15 November 2020

diss-partner-logo
Certification

Our programmes are tailored to boost organizational performance through revenue growth, human development, and operational excellence.

DISS Courses covers different Business related topics such as Administration and Secretarial, Banking and Insurance, Communication and Writing Skills, Finance and Accounting, Human Resources, Leadership and Management, Marketing Social Media, Project Management and a lot more.

TESTIMONIAL

Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor. Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor

Person name

Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor. Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor

Person name

Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor. Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor

Person name
Meet THE INSTRUCTORS
instructor
Instructor Name
Profession

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

instructor2
Instructor Name
Profession

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Leave a Reply

Your email address will not be published. Required fields are marked *