Introduction to Ethical Hacking
Key InfoSec issues; incident management process and penetration testing
Footprinting and Reconnaissance
Various types of footprinting, tools and countermeasures
Scanning Networks
Network scanning techniques and countermeasures
Enumeration
Enumeration techniques and countermeasures
System Hacking
System hacking methodology, steganography and steganalysis
Malware Threats
Analysis and countermeasure for malware types including trojans, viruses, and worms
Evading IDS, Firewalls and Honeypots
IDS and honeypot evasion tools, techniques, and countermeasures
Sniffing
Packet sniffing techniques and defense
Social Engineering
Techniques and countermeasures for social engineering and identify theft
Denial of Service
DoS/DDoS attack tools, techniques, and countermeasures
Session Hijacking
Session hijacking techniques and countermeasures
Hacking Web Servers
Methodology and countermeasures for webserver attacks
Hacking Web Applications
Methodology and countermeasures for web application attacks
SQL Injection
SQL injection attacks and detection tools
Hacking Wireless Networks
Wireless encryption hacking tools, techniques, and methodology; WiFi security
Hacking Mobile Platforms
Mobile platform attack vector; mobile security guidelines and tools; and Android, iOS and Windows vulnerabilities
Cloud Computing
Cloud computing concepts, threats and attacks; security techniques and tools
Cryptography
Cryptography ciphers, attack and tools; public key infrastructure (PKI)