Introduction to Ethical Hacking

Lesson – Hacking Concepts

1.What is Hacking

2.Who is a Hacker?

3.Hacker Classes

4.Hacking Phases

 

Lesson – Ethical Hacking Concepts

1.What is Ethical Hacking?

2.Why Ethical Hacking is Necessary

3.Scope and Limitations of Ethical Hacking

4.Skills of an Ethical Hacker

Module – Footprinting and Reconnaissance

Lesson – Footprinting Concepts

1.What is Footprinting?

2.Objectives of Footprinting

Lesson – Footprinting through Search Engines

1.Footprinting through Search Engines

2.Footprinting using Advanced Google Hacking Techniques

3.Information Gathering Using Google Advanced Search and Image Search

4.Google Hacking Database

Lesson – Footprinting through Web Services

1.Finding Company’s Top-level Domains (TLDs) and Sub-domains

2.Finding the Geographical Location of the Target

3.People Search on Social Networking Sites and People Search Services

4.Gathering Information from LinkedIn

5.Gather Information from Financial Services

6.Footprinting through Job Sites

7.Monitoring Target Using Alerts

8.Information Gathering Using Groups, Forums, and Blogs

9.Determining the Operating System

Lesson – Footprinting through Social Networking Sites

1.Collecting Information through Social Engineering on Social Networking Sites

Lesson – Website Footprinting

1.Website Footprinting

2.Website Footprinting using Web Spiders

3.Mirroring Entire Website

4.Extracting Website Information

5.Extracting Metadata of Public Documents

6.Monitoring Web Pages for Updates and Changes

Lesson – Email Footprinting

1.Tracking Email Communications

2.Collecting Information from Email Header

3.Email Tracking Tools

Lesson – Whois Footprinting

1.Whois Lookup

2.Whois Lookup Result Analysis

3.Whois Lookup Tools

4.Finding IP Geolocation Information

Lesson – DNS Footprinting

1.Extracting DNS Information

2.DNS Interrogation Tools

Lesson – Network Footprinting

1.Locate the Network Range

2.Traceroute

3.Traceroute

4.Traceroute Tools

 

Lesson – Countermeasures

1.Footprinting Countermeasures

Module – Scanning Networks

Lesson – Network Scanning Concepts

1.Overview of Network Scanning

2.TCP Communication Flags

3.TCP/IP Communication

4.Creating Custom Packet Using TCP Flags

5.Scanning in IPv6 Networks

Lesson – Scanning Tools

1.Nmap

2.Hping2 / Hping3

3.Scanning Tools

Lesson – Scanning Techniques

1.Scanning Technique

2.Port Scanning Countermeasures

Lesson – Banner Grabbing

1.Banner Grabbing

2.How to Identify Target System OS

3.Banner Grabbing Countermeasures

Lesson – Draw Network Diagrams

1.Draw Network Diagrams

2.Network Discovery and Mapping Tools

3.Network Discovery Tools for Mobile

Module – System Hacking

Lesson – System Hacking Concepts

Lesson – Cracking Passwords

1.Password Cracking

2.Types of Password Attacks

3.Password Recovery Tools

4.Password Cracking Tools

5.How to Defend against Password Cracking

Lesson – Executing Applications

1.Executing Applications

2.Keylogger

3.Spyware

4.How to Defend Against Keyloggers

5.How to Defend Against Spyware

Module – Malware Threats

Lesson – Malware Concepts

1.Introduction to Malware

2.Different Ways a Malware can Get into a System

3.Common Techniques Attackers Use to Distribute Malware on the Web

4.Components of Malware

Lesson – Trojan Concepts

1.What is a Trojan?

2.How Hackers Use Trojans

3.Common Ports used by Trojans

4.How to Infect Systems Using a Trojan

5.How Attackers Deploy a Trojan

6.Exploit Kits

7.Evading Anti-Virus Techniques

8.Types of Trojans

Lesson – Virus and Worm Concepts

1.Introduction to Viruses

2.Stages of Virus Life

3.Working of Viruses

4.Indications of Virus Attack

5.How does a Computer Get Infected by Viruses

6.Fake Antiviruses

7.Ransomware

8.Types of Viruses

9.Creating Virus

10.Computer Worms

Lesson – Countermeasures              1.Trojan Countermeasures

2.Backdoor Countermeasures

3.Virus and Worms Countermeasures

Lesson – Anti-Malware Software

1.Anti-Trojan Software

2.Antivirus Software