CEH v11 - Certified Ethical Hacking

Learn advanced processes in this Certified Ethical Hacking (CEH) course. In this online ethical hacking training, you will master advanced network packet analysis and system penetration testing techniques to build your network security skill-set and prevent hackers.

CEH v11 - Ethical Hacking Course Overview

Joyatre's CEH certification training course provides you the hands-on training required to master the techniques hackers use to penetrate network systems and fortify your system against it. This ethical hacking course is aligned with the latest CEH v11 by EC-Council and will adequately prepare you to increase your blue team skills.

Skills Covered

Trojans backdoors and countermeasures

IDS firewalls and honeypots

Advanced hacking concepts

Network packet analysis

Mobile and web technologies

Advanced log management

CEH v11 - Ethical Hacking Course Curriculum

Elgibility

This ethical hacking course is for network security officers and practitioners, site administrators, IS/IT specialists and analysts, IS/IT auditors, IT operations managers, IT security officers, network specialists, technical support engineers, senior systems engineers, and systems analysts.

Module 01- Introduction to Ethical Hacking

  • 1 Demo of Aspen and iLabs
  • 2 Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
  • 3 Essential Terminology
  • 4 Elements of Information Security
  • 5 The Security, Functionality, and Usability Triangle
  • 1 Motives, Goals, and Objectives of Information Security Attacks
  • 2 Top Information Security Attack Vectors
  • 3 Information Security Threat Categories
  • 4 Types of Attacks on a System
  • 5 Information Warfare
  • 1 Penetration Testing
  • 2 Why Penetration Testing
  • 3 Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
  • 4 Blue Teaming/Red Teaming
  • 5 Types of Penetration Testing
  • 6 Phases of Penetration Testing
  • 7 Security Testing Methodology
  • 1 What is Hacking
    01:29
  • 2 Who is a Hacker?
  • 3 Hacker Classes
  • 4 Hacking Phases
  • 1 What is Ethical Hacking?
  • 2 Why Ethical Hacking is Necessary
  • 3 Scope and Limitations of Ethical Hacking
  • 4 Skills of an Ethical Hacker
  • 1 Information Assurance (IA)
  • 2 Information Security Management Program
  • 4 Enterprise Information Security Architecture (EISA)
  • 5 Network Security Zoning
  • 6 Defense in Depth
  • 7 Information Security Policies
  • 8 Physical Security
  • 10 What is Risk?
  • 11 Threat Modeling
  • 12 Incident Management
  • 13 Security Incident and Event Management (SIEM)
  • 14 User Behavior Analytics (UBA)
  • 15 Network Security Controls
  • 16 Identity and Access Management (IAM)
  • 17 Data Leakage
  • 18 Data Backup
  • 19 Data Recovery
  • 20 Role of AI/ML in Cyber Security
  • 1 Payment Card Industry Data Security Standard (PCI-DSS)
  • 2 ISO/IEC 27001:2013
  • 3 Health Insurance Portability and Accountability Act (HIPAA)
  • 4 Sarbanes Oxley Act (SOX)
  • 5 The Digital Millennium Copyright Act (DMCA)
  • 6 Federal Information Security Management Act (FISMA)
  • 7 Cyber Law in Different Countries

Module 02- Footprinting and Reconnaissance

  • 1 What is Footprinting?
  • 2 Objectives of Footprinting
  • 1 Footprinting through Search Engines
  • 2 Footprinting using Advanced Google Hacking Techniques
  • 3 Information Gathering Using Google Advanced Search and Image Search
  • 4 Google Hacking Database
  • 5 VoIP and VPN Footprinting through Google Hacking Database
  • 1 Finding Company’s Top-level Domains (TLDs) and Sub-domains
  • 2 Finding the Geographical Location of the Target
  • 3 People Search on Social Networking Sites and People Search Services
  • 4 Gathering Information from LinkedIn
  • 5 Gather Information from Financial Services
  • 6 Footprinting through Job Sites
  • 7 Monitoring Target Using Alerts
  • 8 Information Gathering Using Groups, Forums, and Blogs
  • 9 Determining the Operating System
  • 10 VoIP and VPN Footprinting through SHODAN
  • 1 Collecting Information through Social Engineering on Social Networking Sites
  • 1 Website Footprinting
  • 2 Website Footprinting using Web Spiders
  • 3 Mirroring Entire Website
  • 4 Extracting Website Information from https://archive.org
  • 5 Extracting Metadata of Public Documents
  • 6 Monitoring Web Pages for Updates and Changes
  • 1 Tracking Email Communications
  • 2 Collecting Information from Email Header
  • 3 Email Tracking Tools
  • 1 Competitive Intelligence Gathering
  • 2 Competitive Intelligence - When Did this Company Begin? How Did it Develop?
  • 3 Competitive Intelligence - What Are the Company's Plans?
  • 4 Competitive Intelligence - What Expert Opinions Say About the Company
  • 5 Monitoring Website Traffic of Target Company
  • 6 Tracking Online Reputation of the Target
  • 1 Whois Lookup
  • 2 Whois Lookup Result Analysis
  • 3 Whois Lookup Tools
  • 4 Finding IP Geolocation Information
  • 1 Extracting DNS Information
  • 2 DNS Interrogation Tools
  • 1 Locate the Network Range
  • 2 Traceroute
  • 3 Traceroute
  • 4 Traceroute Tools
  • 1 Footprinting through Social Engineering
    09:17
  • 2 Collect Information Using Eavesdropping, Shoulder Surfing, and Dumpster Diving
  • 1 Maltego
  • 2 Recon-ng
  • 3 FOCA
  • 4 Recon-Dog
  • 5 OSRFramework
  • 6 Additional Footprinting Tools
  • 1 Footprinting Countermeasures
  • 1 Footprinting Pen Testing
  • 2 Footprinting Pen Testing Report Templates

Module 03- Scanning Networks

  • 1 Overview of Network Scanning
  • 2 TCP Communication Flags
  • 3 TCP/IP Communication
  • 4 Creating Custom Packet Using TCP Flags
  • 5 Scanning in IPv6 Networks
  • 1 Nmap
  • 2 Hping2 / Hping3
  • 3 Scanning Tools
  • 4 Scanning Tools for Mobile
  • 1 Scanning Technique
  • 2 Port Scanning Countermeasures
  • 1 IDS/Firewall Evasion Techniques
  • 1 Banner Grabbing
  • 2 How to Identify Target System OS
  • 3 Banner Grabbing Countermeasures
  • 1 Draw Network Diagrams
  • 2 Network Discovery and Mapping Tools
  • 3 Network Discovery Tools for Mobile
  • 1 Scanning Pen Testing

Module 04- Enumeration

  • 1 What is Enumeration?
  • 2 Techniques for Enumeration
  • 3 Services and Ports to Enumerate
  • 1 NetBIOS Enumeration
  • 2 NetBIOS Enumeration Tool
  • 3 Enumerating User Accounts
  • 4 Enumerating Shared Resources Using Net View
  • 1 SNMP (Simple Network Management Protocol) Enumeration
  • 2 Working of SNMP
  • 3 Management Information Base (MIB)
  • 4 SNMP Enumeration Tools
  • 1 LDAP Enumeration
  • 2 LDAP Enumeration Tools
  • 1 NTP Enumeration
  • 2 NTP Enumeration Commands
  • 2 NTP Enumeration Tools
  • 1 SMTP Enumeration
  • 2 SMTP Enumeration Tools
  • 3 DNS Enumeration Using Zone Transfer
  • 1 IPsec Enumeration
  • 2 VoIP Enumeration
  • 3 RPC Enumeration
  • 4 Unix/Linux User Enumeration
  • 1 Enumeration Countermeasures
  • 1 Enumeration Pen Testing

Module 05- Vulnerability Analysis

  • 1 Vulnerability Research
  • 2 Vulnerability Classification
  • 3 What is Vulnerability Assessment?
  • 4 Types of Vulnerability Assessment
  • 5 Vulnerability-Management Life Cycle
  • 1 Comparing Approaches to Vulnerability Assessment
  • 2 Working of Vulnerability Scanning Solutions
  • 3 Types of Vulnerability Assessment Tools
  • 4 Characteristics of a Good Vulnerability Assessment Solution
  • 5 Choosing a Vulnerability Assessment Tool
  • 6 Criteria for Choosing a Vulnerability Assessment Tool
  • 7 Best Practices for Selecting Vulnerability Assessment Tools
  • 1 Common Vulnerability Scoring System (CVSS)
  • 2 Common Vulnerabilities and Exposures (CVE)
  • 3 National Vulnerability Database (NVD)
  • 4 Resources for Vulnerability Research
  • 1 Vulnerability Assessment Tools
  • 2 Vulnerability Assessment Tools for Mobile
  • 1 Vulnerability Assessment Reports
  • 2 Analyzing Vulnerability Scanning Report

Module 06- System Hacking

  • 1 CEH Hacking Methodology (CHM)
  • 2 System Hacking Goals
  • 1 Password Cracking
  • 2 Types of Password Attacks
  • 3 Password Recovery Tools
  • 4 Microsoft Authentication
  • 5 How Hash Passwords Are Stored in Windows SAM?
  • 6 NTLM Authentication Process
  • 7 Kerberos Authentication
  • 8 Password Salting
  • 9 Tools to Extract the Password Hashes
  • 10 Password Cracking Tools
  • 11 How to Defend against Password Cracking
  • 12 How to Defend against LLMNR/NBT-NS Poisoning
  • 1 Privilege Escalation
  • 2 Privilege Escalation Using DLL Hijacking
  • 3 Privilege Escalation by Exploiting Vulnerabilities
  • 4 Privilege Escalation Using Dylib Hijacking
  • 5 Privilege Escalation using Spectre and Meltdown Vulnerabilities
  • 6 Other Privilege Escalation Techniques
  • 7 How to Defend Against Privilege Escalation
  • 1 Executing Applications
  • 2 Keylogger
  • 3 Spyware
  • 4 How to Defend Against Keyloggers
  • 5 How to Defend Against Spyware
  • 1 Rootkits
  • 2 NTFS Data Stream
  • 3 What is Steganography?
  • 1 Covering Tracks
  • 2 Disabling Auditing: Auditpol
  • 3 Clearing Logs
  • 4 Manually Clearing Event Logs
  • 5 Ways to Clear Online Tracks
  • 6 Covering BASH Shell Tracks
  • 7 Covering Tracks on Network
  • 8 Covering Tracks on OS
  • 9 Covering Tracks Tools
  • 1 Password Cracking
  • 2 Privilege Escalation
  • 3 Executing Applications
  • 4 Hiding Files
  • 5 Covering Tracks

Module 07- Malware Threats

  • 1 Introduction to Malware
  • 2 Different Ways a Malware can Get into a System
  • 3 Common Techniques Attackers Use to Distribute Malware on the Web
  • 4 Components of Malware
  • 1 What is a Trojan?
  • 2 How Hackers Use Trojans
  • 3 Common Ports used by Trojans
  • 4 How to Infect Systems Using a Trojan
  • 5 Trojan Horse Construction Kit
  • 6 Wrappers
  • 7 Crypters
  • 8 How Attackers Deploy a Trojan
  • 9 Exploit Kits
  • 10 Evading Anti-Virus Techniques
  • 11 Types of Trojans
  • 1 Introduction to Viruses
  • 2 Stages of Virus Life
  • 3 Working of Viruses
  • 4 Indications of Virus Attack
  • 5 How does a Computer Get Infected by Viruses
  • 6 Virus Hoaxes
  • 7 Fake Antiviruses
  • 8 Ransomware
  • 9 Types of Viruses
  • 10 Creating Virus
  • 11 Computer Worms
  • 12 Worm Makers
  • 1 What is Sheep Dip Computer?
  • 2 Anti-Virus Sensor Systems
  • 3 Introduction to Malware Analysis
  • 4 Malware Analysis Procedure: Preparing Testbed
  • 5 Static Malware Analysis
  • 6 Dynamic Malware Analysis
  • 7 Virus Detection Methods
  • 8 Trojan Analysis: ZeuS/Zbot
  • 9 Virus Analysis: WannaCry
  • 1 Trojan Countermeasures
  • 2 Backdoor Countermeasures
  • 3 Virus and Worms Countermeasures
  • 1 Anti-Trojan Software
  • 2 Antivirus Software
  • 1 Malware Penetration Testing

Module 08- Sniffing

  • 1 Network Sniffing
  • 2 Types of Sniffing
  • 3 How an Attacker Hacks the Network Using Sniffers
  • 4 Protocols Vulnerable to Sniffing
  • 5 Sniffing in the Data Link Layer of the OSI Model
  • 6 Hardware Protocol Analyzers
  • 7 SPAN Port
  • 8 Wiretapping
  • 9 Lawful Interception
  • 1 MAC Address/CAM Table
  • 2 How CAM Works
  • 3 What Happens When CAM Table Is Full?
  • 4 MAC Flooding
  • 5 Switch Port Stealing
  • 6 How to Defend against MAC Attacks
  • 1 How DHCP Works
  • 2 DHCP Request/Reply Messages
  • 3 DHCP Starvation Attack
  • 4 Rogue DHCP Server Attack
  • 5 How to Defend Against DHCP Starvation and Rogue Server Attack
  • 1 What Is Address Resolution Protocol (ARP)?
  • 2 ARP Spoofing Attack
  • 3 Threats of ARP Poisoning
  • 4 ARP Poisoning Tools
  • 5 How to Defend Against ARP Poisoning
  • 6 Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
  • 7 ARP Spoofing Detection Tools
  • 1 MAC Spoofing/Duplicating
  • 2 MAC Spoofing Technique: Windows
  • 3 MAC Spoofing Tools
  • 4 IRDP Spoofing
  • 5 How to Defend Against MAC Spoofing
  • 1 DNS Poisoning Techniques
  • 2 How to Defend Against DNS Spoofing
  • 1 Sniffing Tool: Wireshark
  • 2 Sniffing Tools
  • 3 Packet Sniffing Tools for Mobile
  • 1 How to Defend Against Sniffing
  • 1 How to Detect Sniffing
  • 2 Sniffer Detection Techniques
  • 3 Promiscuous Detection Tools
  • 1 Sniffing Penetration Testing

Module 09- Social Engineering

  • 1 What is Social Engineering?
  • 2 Phases of a Social Engineering Attack
  • 1 Types of Social Engineering
  • 2 Human-based Social Engineering
  • 3 Computer-based Social Engineering
  • 4 Mobile-based Social Engineering
  • 1 Social Engineering Through Impersonation on Social Networking Sites
  • 2 Impersonation on Facebook
  • 3 Risks of Social Networking Threats to Corporate Networks
  • 1 Social Engineering Countermeasures
  • 2 Insider Threats Countermeasures
  • 3 Identity Theft Countermeasures
  • 4 How to Detect Phishing Emails
  • 5 Anti-Phishing Toolbar
  • 6 Common Social Engineering Targets and Defense Strategies
  • 1 Social Engineering Pen Testing
  • 2 Social Engineering Pen Testing Tools
  • 1 Insider Threat / Insider Attack
  • 2 Type of Insider Threats

Module 10- Denial-of-Service

  • 1 What is Denial of Service Attack?
  • 2 What is Distributed Denial of Service Attack?
  • 1 Basic Categories of DoS/DDoS Attack Vectors
  • 2 UDP Flood Attack
  • 3 ICMP Flood Attack
  • 4 Ping of Death and Smurf Attack
  • 5 SYN Flood Attack
  • 6 Fragmentation Attack
  • 7 HTTP GET/POST and Slowloris Attacks
  • 8 Multi-Vector Attack
  • 9 Peer-to-Peer Attacks
  • 10 Permanent Denial-of-Service Attack
  • 11 Distributed Reflection Denial-of-Service (DRDoS)
  • 1 Organized Cyber Crime: Organizational Chart
  • 2 Botnet
  • 3 A Typical Botnet Setup
  • 4 Botnet Ecosystem
  • 5 Scanning Methods for Finding Vulnerable Machines
  • 6 How Malicious Code Propagates?
  • 7 Botnet Trojan
  • 1 DDoS Attack
  • 2 Hackers Advertise Links to Download Botnet
  • 3 Use of Mobile Devices as Botnets for Launching DDoS Attacks
  • 4 DDoS Case Study: Dyn DDoS Attack
  • 1 DoS and DDoS Attack Tool
  • 2 DoS and DDoS Attack Tool for Mobile
  • 1 Detection Techniques
  • 2 DoS/DDoS Countermeasure Strategies
  • 3 DDoS Attack Countermeasures
  • 4 Techniques to Defend against Botnets
  • 5 DoS/DDoS Countermeasures
  • 6 DoS/DDoS Protection at ISP Level
  • 7 Enabling TCP Intercept on Cisco IOS Software
  • 1 Advanced DDoS Protection Appliances
  • 2 DoS/DDoS Protection Tools
  • 1 Denial-of-Service (DoS) Attack Pen Testing

Module 11- Session Hijacking

  • 1 What is Session Hijacking?
  • 2 Why Session Hijacking is Successful?
  • 3 Session Hijacking Process
  • 4 Packet Analysis of a Local Session Hijack
  • 5 Types of Session Hijacking
  • 6 Session Hijacking in OSI Model
  • 7 Spoofing vs. Hijacking
  • 1 Application Level Session Hijacking
  • 2 Compromising Session IDs using Sniffing and by Predicting Session Token
  • 3 Compromising Session IDs Using Man-in-the-Middle Attack
  • 4 Compromising Session IDs Using Man-in-the-Browser Attack
  • 5 Compromising Session IDs Using Client-side Attacks
  • 6 Compromising Session IDs Using Client-side Attacks: Cross-site Script Attack
  • 7 Compromising Session IDs Using Client-side Attacks: Cross-site Request Forgery Attack
  • 8 Compromising Session IDs Using Session Replay Attack
  • 9 Compromising Session IDs Using Session Fixation
  • 10 Session Hijacking Using Proxy Servers
  • 11 Session Hijacking Using CRIME Attack
  • 12 Session Hijacking Using Forbidden Attack
  • 1 TCP/IP Hijacking
  • 2 IP Spoofing: Source Routed Packets
  • 3 RST Hijacking
  • 4 Blind Hijacking
  • 5 UDP Hijacking
  • 6 MiTM Attack Using Forged ICMP and ARP Spoofing
  • 1 Session Hijacking Tools
  • 2 Session Hijacking Tools For Mobile
  • 1 Session Hijacking Detection Methods
  • 2 Protecting against Session Hijacking
  • 3 Methods to Prevent Session Hijacking: To be Followed by Web Developers
  • 4 Methods to Prevent Session Hijacking: To be Followed by Web Users
  • 5 Session Hijacking Detection Tools
  • 6 Approaches Vulnerable to Session Hijacking and their Preventative Solutions
  • 7 Approaches to Prevent Session Hijacking
  • 8 IPSec
  • 9 Session Hijacking Prevention Tools
  • 1 Session Hijacking Pen Testing

Module 12 - Evading IDS, Firewalls, and Honeypots

  • 1 Intrusion Detection System (IDS)
  • 2 Firewall
  • 3 Honeypot
  • 1 Intrusion Detection Tool
  • 2 Firewalls
  • 3 Honeypot Tools
  • 1 IDS Evasion Techniques
  • 1 Firewall Evasion Techniques
  • 1 IDS/Firewall Evasion Tools
  • 2 Packet Fragment Generator Tools
  • 1 Detecting Honeypots
  • 2 Detecting and Defeating Honeypots
  • 3 Honeypot Detection Tool: Send-Safe Honeypot Hunte
  • 1 How to Defend Against IDS Evasion
  • 2 How to Defend Against Firewall Evasion
  • Firewall/IDS Penetration Testing

Module 13- Hacking Web Servers

  • 1 Web Server Operations
  • 2 Open Source Web Server Architecture
  • 3 IIS Web Server Architecture
  • 4 Web Server Security Issue
  • 5 Why Web Servers Are Compromised?
  • 6 Impact of Web Server Attacks
  • 1 DoS/DDoS Attacks
  • 2 DNS Server Hijacking
  • 3 DNS Amplification Attack
  • 4 Directory Traversal Attacks
  • 5 Man-in-the-Middle/Sniffing Attack
  • 6 Phishing Attacks
  • 7 Website Defacement
  • 8 Web Server Misconfiguration
  • 9 HTTP Response Splitting Attack
  • 10 Web Cache Poisoning Attack
  • 11 SSH Brute Force Attack
  • 12 Web Server Password Cracking
  • 13 Web Application Attacks
  • 1 Information Gathering
  • 2 Web Server Footprinting/Banner Grabbing
  • 3 Website Mirroring
  • 4 Vulnerability Scanning
  • 5 Session Hijacking
  • 6 Web Server Passwords Hacking
  • 7 Using Application Server as a Proxy
  • 1 Metasploit
  • 2 Web Server Attack Tools
  • 1 Place Web Servers in Separate Secure Server Security Segment on Network
  • 2 Countermeasures
  • 3 Detecting Web Server Hacking Attempts
  • 4 How to Defend Against Web Server Attacks
  • 5 How to Defend against HTTP Response Splitting and Web Cache Poisoning
  • 6 How to Defend against DNS Hijacking
  • 1 Patches and Hotfixes
  • 2 What is Patch Management
  • 3 Installation of a Patch
  • 4 Patch Management Tools
  • 1 Web Application Security Scanners
  • 2 Web Server Security Scanners
  • 3 Web Server Security Tools
  • 1 Web Server Penetration Testing
  • 2 Web Server Pen Testing Tools

Module 14- Hacking Web Applications

  • 1 Introduction to Web Applications
  • 2 Web Application Architecture
  • 3 Web 2.0 Applications
  • 4 Vulnerability Stack
  • 1 OWASP Top 10 Application Security Risks – 2017
  • 2 Other Web Application Threats
  • 1 Web App Hacking Methodology
  • 2 Footprint Web Infrastructure
  • 2 Attack Web Servers
  • 3 Analyze Web Applications
  • 4 Bypass Client-Side Controls
  • 5 Attack Authentication Mechanism
  • 6 Authorization Attack Schemes
  • 7 Attack Access Controls
  • 8 Attack Session Management Mechanism
  • 9 Perform Injection/Input Validation Attacks
  • 10 Attack Application Logic Flaws
  • 11 Attack Database Connectivity
  • 12 Attack Web App Client
  • 13 Attack Web Services
  • 1 Web Application Fuzz Testing
  • 2 Source Code Review
  • 3 Encoding Schemes
  • 4 How to Defend Against Injection Attacks
  • 5 Web Application Attack Countermeasures
  • 6 How to Defend Against Web Application Attacks
  • 1 Web Application Security Testing Tools
  • 2 Web Application Firewall
  • 1 Web Application Pen Testing
  • 2 Web Application Pen Testing Framework

Module 15- SQL Injection

  • 1 What is SQL Injection?
  • 2 SQL Injection and Server-side Technologies
  • 3 Understanding HTTP POST Request
  • 4 Understanding Normal SQL Query
  • 5 Understanding an SQL Injection Query
  • 6 Understanding an SQL Injection Query – Code Analysis
  • 8 Example of a Web App Vulnerable to SQL Injection: BadProductList.aspx
  • 9 Example of a Web Application Vulnerable to SQL Injection: Attack Analysis
  • 10 Example of SQL Injection
  • 1 Types of SQL Injection
  • 1 SQL Injection Methodology
  • 1 SQL Injection Tools
  • 2 SQL Injection Tools
  • 3 SQL Injection Tools for Mobile
  • 1 Evading IDS
  • 2 Types of Signature Evasion Techniques
  • 1 How to Defend Against SQL Injection Attacks?
  • 2 SQL Injection Detection Tools
  • 3 SQL Injection Detection Tools

Module 16- Hacking Wireless Networks

  • 1 Wireless Terminologies
  • 2 Wireless Networks
  • 3 Wireless Standards
  • 4 Service Set Identifier (SSID)
  • 5 Wi-Fi Authentication Modes
  • 6 Wi-Fi Authentication Process Using a Centralized Authentication Server
  • 7 Types of Wireless Antenna
  • 1 Types of Wireless Encryption
  • 2 WEP vs. WPA vs. WPA2
  • 3 WEP Issues
  • 4 Weak Initialization Vectors (IV)
  • 1 Wireless Hacking Methodology
  • 1 WEP/WPA Cracking Tools
  • 2 WEP/WPA Cracking Tool for Mobile
  • 3 Wi-Fi Sniffer
  • 4 Wi-Fi Traffic Analyzer Tools
  • 5 Other Wireless Hacking Tools
  • 1 Bluetooth Stack
  • 2 Bluetooth Hacking
  • 3 Bluetooth Threats
  • 4 How to BlueJack a Victim?
  • 4 Bluetooth Hacking Tools
  • 1 Wireless Security Layers
  • 2 How to Defend Against WPA/WPA2 Cracking
  • 3 How to Defend Against KRACK Attacks
  • 4 How to Detect and Block Rogue AP
  • 5 How to Defend Against Wireless Attacks
  • 6 How to Defend Against Bluetooth Hacking
  • 1 Wireless Intrusion Prevention Systems
  • 2 Wireless IPS Deployment
  • 3 Wi-Fi Security Auditing Tool
  • 4 Wi-Fi Intrusion Prevention System
  • 5 Wi-Fi Predictive Planning Tools
  • 6 Wi-Fi Vulnerability Scanning Tools
  • 7 Bluetooth Security Tool
  • 8 Wi-Fi Security Tools for Mobile
  • 1 Wireless Penetration Testing
  • 2 Wireless Penetration Testing Framework

Module 17- Hacking Mobile Platforms

  • 1 Vulnerable Areas in Mobile Business Environment
  • 2 OWASP Top 10 Mobile Risks - 2016
  • 3 Anatomy of a Mobile Attack
  • 4 How a Hacker can Profit from Mobile when Successfully Compromised
  • 5 Mobile Attack Vectors and Mobile Platform Vulnerabilities
  • 6 Security Issues Arising from App Stores
  • 7 App Sandboxing Issues
  • 8 Mobile Spam
  • 9 SMS Phishing Attack (SMiShing) (Targeted Attack Scan)
  • 10 Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections
  • 1 Android OS
  • 2 Android Rooting
  • 3 Blocking Wi-Fi Access using NetCut
  • 4 Hacking with zANTI
  • 5 Hacking Networks Using Network Spoofer
  • 6 Launching DoS Attack using Low Orbit Ion Cannon (LOIC)
  • 7 Performing Session Hijacking Using DroidSheep
  • 8 Hacking with Orbot Proxy
  • 9 Android-based Sniffers
  • 10 Android Trojans
  • 11 Securing Android Devices
  • 12 Android Security Tool: Find My Device
  • 13 Android Security Tools
  • 14 Android Vulnerability Scanner
  • 15 Android Device Tracking Tools
  • 1 Apple iOS
  • 2 Jailbreaking iOS
  • 3 iOS Trojans
  • 4 Guidelines for Securing iOS Devices
  • 5 iOS Device Tracking Tools
  • 6 iOS Device Security Tools
  • 1 Mobile Spyware
  • 2 Mobile Spyware: mSpy
  • 3 Mobile Spywares
  • 1 Mobile Device Management (MDM)
  • 2 Mobile Device Management Solutions
  • 3 Bring Your Own Device (BYOD)
  • 1 General Guidelines for Mobile Platform Security
  • 2 Mobile Device Security Guidelines for Administrator
  • 3 SMS Phishing Countermeasures
  • 4 Mobile Protection Tools
  • 5 Mobile Anti-Spyware
  • 1 Android Phone Pen Testing
  • 2 iPhone Pen Testing
  • 3 Mobile Pen Testing Toolkit: Hackode

Module 18- IoT Hacking

  • 1 What is IoT
  • 2 How IoT Works
  • 3 IoT Architecture
  • 4 IoT Application Areas and Devices
  • 5 IoT Technologies and Protocols
  • 6 IoT Communication Models
  • 7 Challenges of IoT
  • 8 Threat vs Opportunity
  • 1 IoT Security Problems
  • 2 OWASP Top 10 IoT Vulnerabilities and Obstacles
  • 3 IoT Attack Surface Areas
  • 4 IoT Threats
  • 5 Hacking IoT Devices: General Scenario
  • 6 IoT Attacks
  • 7 IoT Attacks in Different Sectors
  • 1 What is IoT Device Hacking?
  • 2 IoT Hacking Methodology
  • 1 Information Gathering Tools
  • 2 Sniffing Tools
  • 3 Vulnerability Scanning Tools
  • 4 IoT Hacking Tools
  • 1 How to Defend Against IoT Hacking
  • 2 General Guidelines for IoT Device Manufacturing Companies
  • 3 OWASP Top 10 IoT Vulnerabilities Solutions
  • 4 IoT Framework Security Considerations
  • 5 IoT Security Tools

Module 19- Cloud Computing

  • 1 Introduction to Cloud Computing
  • 2 Separation of Responsibilities in Cloud
  • 3 Cloud Deployment Models
  • 4 NIST Cloud Computing Reference Architecture
  • 5 Cloud Computing Benefits
  • 6 Understanding Virtualization
  • 1 Cloud Computing Threats
  • 1 Service Hijacking using Social Engineering Attacks
  • 2 Service Hijacking using Network Sniffing
  • 3 Session Hijacking using XSS Attack
  • 4 Session Hijacking using Session Riding
  • 5 Domain Name System (DNS) Attacks
  • 6 Side Channel Attacks or Cross-guest VM Breaches
  • 7 SQL Injection Attacks
  • 8 Cryptanalysis Attacks
  • 9 Wrapping Attack
  • 10 Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
  • 11 Man-in-the-Cloud Attack
  • 1 Cloud Security Control Layers
  • 2 Cloud Security is the Responsibility of both Cloud Provider and Consumer
  • 3 Cloud Computing Security Considerations
  • 4 Placement of Security Controls in the Cloud
  • 5 Best Practices for Securing Cloud
  • 6 NIST Recommendations for Cloud Security
  • 7 Organization/Provider Cloud Security Compliance Checklist
  • 1 Cloud Security Tools
  • 1 What is Cloud Pen Testing?
  • 2 Key Considerations for Pen Testing in the Cloud
  • 3 Cloud Penetration Testing
  • 4 Recommendations for Cloud Testing

Module 20- Cryptography

  • 1 Cryptography
  • 2 Government Access to Keys (GAK)
  • 1 Ciphers
  • 2 Data Encryption Standard (DES)
  • 3 Advanced Encryption Standard (AES)
  • 4 RC4, RC5, and RC6 Algorithms
  • 5 Twofish
  • 6 The DSA and Related Signature Schemes
  • 7 Rivest Shamir Adleman (RSA)
  • 8 Diffie-Hellman
  • 9 Message Digest (One-Way Hash) Functions
  • 1 MD5 Hash Calculators
  • 2 Hash Calculators for Mobile
  • 3 Cryptography Tools
  • 4 Cryptography Tools for Mobile
  • 1 Public Key Infrastructure (PKI)
  • 1 Digital Signature
  • 2 Secure Sockets Layer (SSL)
  • 3 Transport Layer Security (TLS)
  • 4 Cryptography Toolkit
  • 5 Pretty Good Privacy (PGP)
  • 1 Disk Encryption
  • 2 Disk Encryption Tools
  • 1 Cryptanalysis Methods
  • 2 Code Breaking Methodologies
  • 3 Cryptography Attacks
  • 4 Cryptanalysis Tools
  • 5 Online MD5 Decryption Tools
  • 1 How to Defend Against Cryptographic Attacks
© 2020 All Rights Reserved by JOYATRES | Designed By LOONEYCODES