ETHICAL HACKING CONTENTS
Training | Consulting | Outsourcing
1 Trimester-1
Paper-1
1. INTRODUCTION TO NETWORKING
1. Introduction & History
2. Advantage & Disadvantage
3. Computer Networks Protocol
4. OSI Model & Physical Topology
5. Network Architecture
6. Communication Media
2. THE INTERNET PROTOCOL (IP)
1. Introduction to IP
2. IP Packet Format
3. IP Address Classes
4. Transmission Control Protocol
5. Subnetting & CIDR
3. IP ROUTING
1. Introduction to hardware & software related to IP routing
2. Routing information Protocol
3. Enhanced Interior Routing Protocol
4. Open Shortest Path First
4. SWITCHING & BRIDGING
1. Introduction of Switching & Bridging
2. STP & LAN Switch Types
3. VLAN - Virtual LAN
4. Flexibility and Scalability
5. WIDE AREA NETWORK
1. Understanding WAN fundamentals
2. Understanding Tunneling Protocol & Frame Relay
3. Fundamentals
4. VPN - Virtual Private Network
5. NAT - Network Address Translation
ETHICAL HACKING CONTENTS
6. NETWORK CONFIGURATION AND
TROUBLESHOOTING
1. Networking Introduction
2. LAN Switching
3. Wireless Networking
4. Layer by Layer Troubleshooting with a Cisco Router
5. Router Troubleshooting at OSI Layers
6. Managing your network connections
7. IMPLEMENTING AND TROUBLE-SHOOTING WI-FI NETWORKS
1. Introduction to 802.11
2. Finding And Connecting To Wireless Networks
3. Introduction to RADIUS
4. EAP & Bringing EAP to the LAN
5. Authenticating the AP to the User, and Vice Versa
6. Scanning and Enumerating 802.11 Networks
Paper - 2
1. INFORMATION SECURITY & ETHICAL HACKING
1. Introduction
2. Basics of Data
3. Information
4. Security
5. Hacking
6. Richard's Law of computer security
7. Types of hackers
8. Cyber Threats
9. Case Studies
2. DESKTOP & SERVER SECURITY
1. Windows Security
2. Windows Vulnerability
3. Hacking into windows platform
4. Windows task manager
5. Linux Security
3. NETWORK & FIREWALL SECURITY
1. Setting up a LAN
2. Threats Of LAN
ETHICAL HACKING CONTENTS
3. Firewall
4. Anti-virus
5. Anti Spyware
6. Network Scanner
7. Introduction to Wireless Network security
4. INTERNET & CYBER SECURITY
1. IP Spoofing
2. E-Mail Tracking
3. Proxy Servers
4. E-mail Forgery and Detection
5. MAC Spoofing
6. Microsoft Outlook Security
7. Cyber Stalking
5. INFORMATION GATHERING METHODS
1. Daemon-Banner Grabbing
2. Active Finger Printing
3. Passive Fingerprinting
4. Port Scanning
5. Full TCP Scan Half TCP Scan
6. Flag
7. Tracert
6. WINDOWS REGISTRIES
1. Reshack
2. Registry tweaks
7. HACKING ATTACKS
1. Social Engineering Attack
2. Phishing Attack
3. Input Validation Attack
4. SqL injection
5. XSS attack
6. Attack Dos Attacks
7. Sniffing Attack
8. Session Hijacking etc.
8. EMAIL SECURITY & WEB SECURITY
1. Introduction to E-mail
2. How E-mail Works
ETHICAL HACKING CONTENTS
3. Mail servers
4. E-mail Protocol
5. Web Servers (introduction to web Security)
Network Security
Trimester-2
Paper - 1
1. PROGRAMMING IN C
1. Introduction to C
2. Data Types
3. Basic programming concept
4. If else ladder
5. Switch statements
6. Array, simple array ,multi dimension
7. Function
8. Loops: for, do while, while
9. Structure, structure with function, structure array,
[Link]
[Link] return from function
[Link] to function, passing value through pointer
[Link] to file handling ,what is text file
[Link] compiler (#)
2. PROGRAMMING IN C++
1. OOPS
2. Class, how to declare a class
3. Inheritance, Polymorphism, Operator overloading,
4. Abstraction
5. Using class with function
6. Exception handling
7. Template, generic class
3. INTRODUCTION TO DATA STRUCTURE
1. Queue
2. Stack
3. Link list
4. Tree
Paper - 2
1. WIRELESS & MOBILE SECURITY
1. Introduction to the Wireless
ETHICAL HACKING CONTENTS
2. Mobile Technology
3. GSM Technology
4. CDMA Technology
5. Different type of attacks
2. VOIP & VPN SECURITY
1. Introduction to the VOIP and VPN Technology Protocol
and Architecture
3. ROUTER SECURITY
2. Introduction to router
3. Protocols on a router and types of connection
4. NAT Services
5. Various types of Attacks and their Detection
4. IDS & IPS
1. Introduction to IPS & IDS
2. IDS Overview (AIDS, HIDS, and NIDS)
3. IDS system & IPS System
4. Perimeter Firewall
5. Analysis of System Deficiencies
6. VoIP & Wireless 7
Trimester-3
Paper - 1
1. VULNERABILITY ASSESSMENT & PENETRATION TESTING
1. Scoping and Tools for Vulnerability Tests
2. Risk Assessment
3. Google Hacking
4. Methodology
5. Google Hacking
6. Application Audit
7. Network Devices
2. SECURED PROGRAMMING TECHNIQUE & ADVANCED
HACKING ATTACKS
1. Defining Programming methodology
2. Explaining Bugs
3. Removing Errors
4. Buffer over flows
ETHICAL HACKING CONTENTS
5. Back door
6. Trojans
7. Enumeration
Paper - 2
1. INFORMATION SECURITY MANAGEMENT SYSTEM
1. ISO 27001 and other Standard
2. Policy & Projects
3. Audit & Certification
4. Managing Security Awareness
5. Risk Assessment
6. Business Continuity and Disaster Recovering
7. Planning Security Management Practices
2. INFORMATION SECURITY AUDITING
1. Audit Objectives & Steps
2. Network Controls
3. Network Data Standards and Data Access
4. Access to Network Operating Systems Software and Facilities
5. Data Encryption and Filtering
3. SECURITY FRAMEWORK-COBIT
1. Security
2. Adequate Security
3. Approaches for Achieving Security
4. Holistic View of Security
5. Defense in Depth
6. OCTAVE
7. Security Risk Analysis
8. Threats Modeling
9. Current Security Issues
[Link] for Security
Computer Forensics
Trimester-4
Paper - 1
1. CRYPTOGRAPHY & ENCRYPTION
1. Introduction to cryptography
2. SKCS
ETHICAL HACKING CONTENTS
3. PKCS
4. MD5
5. DES
6. RSA
7. Digital signature
8. Digital certificate
Paper - 2
1. CYBER CRIME INVESTIGATION
1. Forensics methodology and forensic tool kit
2. INTERNATIONAL CYBER LAWS
3. COMPUTER FORENSICS
2. Introduction to Cyber Forensics
3. Cyber Crimes
4. Recognizing Preparation and Preservation
5. Documentation and reporting
6. Security Systems to Prevent Further Attacks
7. Basic Steps in Forensic Analysis of UNIX System
8. Crime Scene Management
9. Live System Data Gathering
[Link] of deleted files
[Link]- verbal analysis
[Link] of common LOG files
13. Advanced Honey Pots