-
Basic Networking
- Introduction to the term Networking Introduction to the ...
- Types of Network Types of Network
- OSI Model OSI Model
- Client/Server Configuration Client/Server Config...
- Topologies Media (Guided Media) Topologies Media (Gu...
- IP Address (IPv4, IPv6) IP Address (IPv4, IP...
- VLSM, CIDR, Subnetting (Network/Host) VLSM, CIDR, Subnetti...
- Devices Devices
- Protocols Protocols
- TCP/IP Applications and Services TCP/IP Applications ...
-
Linux Administration
- Introduction of Linux Introduction of Linu...
- History of Linux & Unix History of Linux �...
- Installation of RHEL Installation of RHEL
- Directory Structure Directory Structure
- Basic Commands Basic Commands
- VI Editor VI Editor
- Permissions Permissions
- Users & Groups Users & Groups
- I/O Redirectors I/O Redirectors
- Hardlink and Softlink Hardlink and Softlin...
- Compression/Decompression, Backup and Scheduling Tasks Compression/Decompre...
-
Linux Commands
-
Introduction to Ethical Hacking
- The module briefs about information security, information security threats and attack vectors. The module briefs ab...
- Discusses various hacking concepts, type and phases. Discusses various ha...
- Addresses the pre-requisites to become an ethical hacker and also the scope and limitations of ethical hacking Addresses the pre-re...
- Discusses various information security controls such as Information Assurance (IA), Defense-in-path, security policies, physical security, risk management, threat modelling, incident management, AI/ML, Etc. Discusses various in...
- Addresses the penetration testing process and security testing methodology Addresses the penetr...
- Discusses various information security acts and laws Discusses various in...
-
Footprinting and Reconnaissance
- Discusses footprinting terminologies. Discusses footprinti...
- Briefs on the footprinting methodologies such as footprinting through search engines, web services, social networking sites, social engineering, website footprinting, Email footprinting, competitive intelligence gathering, whois Briefs on the footpr...
- footprinting, DNS footprinting, etc. footprinting, DNS fo...
- Provides an assessment of various footprinting tools used to collect information regarding a system or network. Provides an assessme...
- Discusses various footprinting countermeasures to defend against footprinting attacts. Discusses various fo...
- Describes various penetration testing steps involved in footprinting. Describes various pe...
-
Scanning Networks
- Discusses network scanning concepts Discusses network sc...
- The module briefs on scanning methodology used to identify the hosts, ports, and services in a network The module briefs on...
- Checking for live systems and ports using various scanning techniques Checking for live sy...
- Identifying services using various scanning techniques Identifying services...
- IDS/firewall evasion techniques IDS/firewall evasion...
- Banner grabbing/OS fingerprinting Banner grabbing/OS f...
- Drawing network diagrams of the vulnerable hosts Drawing network diag...
- Provides an assessment of various scanning tools used to collect information regarding hosts, ports, and services in a network Discusses various IP spoofing detection techniques Provides an assessme...
- Discusses various penetration testing steps used to scan the network Discusses various pe...
-
Enumeration
- This module explains the process of extracting user names, machine names, network resources, shares, and services from a system This module explains...
- Describes the techniques for enumeration such as NetBIOS Enumeration, SNMP enumeration, LDAP enumeration, NTP enumeration, SMTP enumeration, DNS enumeration, IPsec enumeration, VoIP enumeration, RPC enumeration, and Unix/Linux user enumeration Describes the techni...
- Lists the enumeration tools that can be used to extract the data Discusses various enumeration countermeasures to defend against enumeration attacks Lists the enumeratio...
- Assesses various penetration testing steps used to extract the data from a system Assesses various pen...
-
Vulnerability Analysis
- Discusses vulnerability assessment concepts Briefs the working of vulnerability scanning solutions and criteria for choosing those tools Discusses vulnerabil...
- Describes the importance of vulnerability scoring systems in vulnerability assessment Describes the import...
- Lists various tools used to perform vulnerability assessment Discusses how to generate and analyze vulnerability assessment reports Lists various tools ...
-
System Hacking
- Describes the CEH system hacking process which is classified into three stages: gaining access (by cracking passwords and escalating privileges), maintaining access (executing applications and hiding files), and clearing logs (covering tracks) Explains the hacking tools (keyloggers, spywares, and rootkits, etc.) that aid the hacking process Describes the CEH sy...
- Discusses various steganography techniques for hiding a secret message Discusses various st...
- Explains various steganalysis methods and steganography detection tools Explains various ste...
- Presents the countermeasures that can be applied at every stage to prevent an attack on the system Presents the counter...
- Discusses various penetration testing steps Discusses various pe...
-
Malware Threats
- Discusses various malware and malware propagation techniques Discusses various ma...
- Discusses Trojans and viruses, their types, and how they infect files/systems Discusses Trojans an...
- Lists some of the latest Trojans that are used to infect a system Discusses worms that can compromise a business or system’s security Explains the static and dynanic malware analysis process Lists some of the la...
- Briefs on the various methods of virus detection Briefs on the variou...
- Discusses various countermeasures to defend against malware attacks Lists anti-malware tools Discusses various co...
- Assesses various malware penetration testing steps Assesses various mal...
-
Sniffing
- Briefs about the basic concepts of sniffing network and various types of sniffing Briefs about the bas...
- Discusses various sniffing techniques such as MAC attack, DHCP attack, ARP poisoning, DNS poisoning, etc. Discusses various sn...
- Discusses on how to defend against various sniffing attacks Discusses on how to ...
- Features various sniffing tools and explains how an attacker hacks a network using them Features various sni...
- Lists a number of countermeasures to defend against sniffing Explains various sniffing detection methods and tools Lists a number of co...
- Discusses various penetration testing steps Discusses various pe...
-
Social Engineering
- Introduces social engineering concepts and various attack phases Introduces social en...
- Describes the different types of social engineering with examples Explains various types of insider threats Describes the differ...
- Explains in detail how impersonation on social engineering sites is carried out Explains in detail h...
- Briefs how attackers obtain and exploit personally identifiable information and authenticate themselves, in order to impersonate victim Briefs how attackers...
- Lists various social engineering, insider threats, and identity theft countermeasures Lists various social...
- Lists anti-phishing tools to detect phishing emails and websites Tabulates common social engineering tactics and proposes combat strategies to prevent such attacks Lists anti-phishing ...
- Talks about social engineering penetration testing Talks about social e...
-
Denial-of-Service
- This module explains DoS/DDoS attacks, the classification of DoS/DDoS attacks, and various attack techniques Discusses Botnets, the types of bots, and how they infect the system Demonstrates various tools to perform DoS and DDoS attacks This module explains...
- Discusses various techniques to detect, prevent, and mitigate DoS/DDoS attacks Discusses various te...
- Briefs about various post-attack forensic methods Briefs about various...
- Explains various techniques to defend against botnets Explains various tec...
- Lists various DoS/DDoS protection tools Lists various DoS/DD...
- Explains countermeasures to prevent DoS/DDoS attacks and pen testing steps Explains countermeas...
-
Session Hijacking
- This module explains session hijacking concepts This module explains...
- Discusses about network and application level session hijacking Explains various session hijacking tools Discusses about netw...
- Explains various session hijacking detection methods and tools Explains countermeasures to prevent session hijacking attacks Discusses various approaches vulnerable to session hijacking and their preventative solutions Explains various ses...
- Discusses various penetration testing steps involved in session hijacking Discusses various pe...
-
Evading IDS, Firewalls, and Honeypots
- This module gives an introduction to IDS, firewall and honeypot concepts and types This module gives an...
- Demonstrates various IDS, firewall and honeypot solutions Demonstrates various...
- Describes various IDS and firewall evasion techniques Describes various ID...
- Explains various techniques to detect and defeat honeypots Explains various tec...
- Lists various IDS/firewall evasion tools and honeypot detection tools Lists various IDS/fi...
- Discusses the countermeasures to defend against IDS/firewall evasion Discusses various penetration testing steps involved in firewall/IDS penetration testing Discusses the counte...
-
Hacking Web Servers
- Explains open source web server and IIS architecture Explains open source...
- Discusses various reasons why web servers are compromised Demonstrates various key web server attack techniques and tools Discusses about web server attack methodology and tools Discusses various re...
- Discusses various methods to detect web server hacking attempts Explains countermeasures to prevent web server attacks Discusses various me...
- Explains what is patch management and associated concepts Explains what is pat...
- Lists various web server security tools Lists various web se...
- Discusses various penetration testing steps involved in web server pen testing Discusses various pe...
-
Hacking Web Applications
- This module gives an introduction to web application architecture and demonstrates how web applications work? This module gives an...
- Lists and explains various web application threats and attacks Explains web application hacking methodology Lists and explains v...
- Demonstrates various web application hacking tools Demonstrates various...
- Discusses countermeasures to defend against web application attacks Demonstrates various web application security tools Discusses countermea...
- Discusses various penetration testing steps and tools involved in web application pen testing Discusses various pe...
-
SQL Injection
- This module gives an introduction to SQL Injection and threats from SQL injection attacks This module gives an...
- Explains various types of SQL injection attacks with examples Explains SQL injection methodology Explains various typ...
- Demonstrates various SQL injection and detection tools Demonstrates various...
- Explains various evasion techniques Explains various eva...
- Explains countermeasures to prevent SQL injection attacks Explains countermeas...
-
Hacking Wireless Networks
- The module gives an introduction to wireless terminologies, types, standards, etc. The module gives an ...
- Discusses the types of wireless encryption and their working Discusses the types ...
- Lists and explains various wireless threats Lists and explains v...
- Describes wireless hacking methodology Demonstrates various wireless hacking tools Describes wireless h...
- Discusses about Bluetooth hacking, threats, and Bluetooth hacking tools Discusses about Blue...
- Discusses how to defend against wireless attacks Discusses how to def...
- Illustrates various wireless security tools Illustrates various ...
- Discusses various penetration testing steps and tools involved in wireless penetration testing Discusses various pe...
-
Hacking Mobile Platforms
- This module discusses mobile platform attack vectors in detail and explores app sandboxing issues This module discusse...
- Discusses Android OS architecture briefly and demonstrates hacking android OS using various tools Discusses Android OS...
- Illustrates working of various Android Trojans and guidelines for securing Android devices Illustrates working ...
- Gives a brief knowledge on jailbreaking iOS, its types, techniques and tools required for jailbreaking Gives a brief knowle...
- Illustrates various iOS Trojans and guidelines for securing iOS devices Illustrates various ...
- Discusses about different mobile spyware Discusses about diff...
- Explains about mobile device management and solutions for mobile device management Explains about mobil...
- Lists guidelines for BYOD security Lists guidelines for...
- Provides brief knowledge on mobile security guidelines and lists various mobile security tools Provides brief knowl...
- Discusses various penetration testing steps involved in pen testing for Android phones and iPhones Discusses various pe...
-
IoT Hacking
- This module gives an introduction to IoT concepts This module gives an...
- Briefs about various IoT challenges and security problems Briefs about various...
- Discusses about various IoT threats and attack surface areas Tabulates various IoT attacks in different sectors Discusses about vari...
- Discusses the IoT hacking methodology and various IoT hacking tools Discusses various countermeasures to prevent IoT hacking Discusses the IoT ha...
- Explains security considerations for IoT framework Explains security co...
- Lists various IoT security tools Lists various IoT se...
- Discusses various steps involved in IoT pen testing Discusses various st...
-
Cloud Computing
- Briefs about the basic concepts of cloud computing and various types of cloud computing services Briefs about the bas...
- Explains the importance of virtualization in cloud computing Explains the importa...
- Lists and explains various threats of cloud computing Lists and explains v...
- Discusses various cloud computing attacks Discusses various cl...
- Briefs about various cloud computing security considerations Discusses best practices for securing cloud Briefs about various...
- Discusses various cloud security tools Discusses various cl...
- Explains various key considerations for pen testing in the cloud Discusses various steps involved in cloud penetration testing Explains various key...
-
Cryptography
- This module gives an introduction to cryptography concepts This module gives an...
- Discusses the types of cryptography and their working process Discusses about ciphers and its types Discusses the types ...
- Explains various encryption algorithms with examples Explains various enc...
- Discusses various hashing algorithms and lists various hash calculators Discusses various ha...
- Lists and features various cryptography tools Lists and features v...
- Explains Public Key Infrastructure (PKI) and its components Discusses email encryption, disk encryption, and cryptography attacks Explains Public Key ...
- Briefs various cryptanalysis methods and lists various cryptanalysis tools Briefs various crypt...
- Explains how to defend against cryptographic attacks Explains how to defe...
Previous Course
Exploring virtual file system (Proc)