Introduction to Ethical Hacking
o Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
o Information Security Overview
o Information Security Threats and Attack Vectors
o Hacking Concepts, Types, and Phases
o Ethical Hacking Concepts and Scope
o Information Security Controls
o Information Security Laws and Standards
Footprinting and Reconnaissance
o Footprinting Concepts
o Footprinting Methodology
o Footprinting Tools
o Footprinting Countermeasures
o Footprinting Penetration Testing
Scanning Networks
o Overview of Network Scanning
o CEH Scanning Methodology
Enumeration
o Enumeration Concepts
o NetBIOS Enumeration
o SNMP Enumeration
o LDAP Enumeration
o NTP Enumeration
o SMTP Enumeration
o Enumeration Countermeasures
o SMB Enumeration Countermeasures
o Enumeration Pen Testing
System Hacking
o Information at Hand Before System Hacking Stage
o System Hacking: Goals
o CEH Hacking Methodology (CHM)
o CEH System Hacking Steps
o Hiding Files
o Covering Tracks
o Penetration Testing
Malware Threats
o Introduction to Malware
o Trojan Concepts
o Types of Trojans
o Virus and Worms Concepts
o Malware Reverse Engineering
o Malware Detection
o Countermeasures
o Anti-Malware Software
o Penetration Testing
Sniffing
o Sniffing Concepts
o MAC Attacks
o DHCP Attacks
o ARP Poisoning
o Spoofing Attack
o DNS Poisoning
o Sniffing Tools
o Sniffing Tool: Wireshark
o Follow TCP Stream in Wireshark
o Display Filters in Wireshark
o Additional Wireshark Filters
o Sniffing Tool
o Packet Sniffing Tool: Capsa Network Analyzer
o Network Packet Analyzer
o Counter measures
o Sniffing Detection Techniques
o Sniffing Pen Testing
Social Engineering
o Social Engineering Concepts
o Social Engineering Techniques
o Impersonation on Social Networking Sites
o Identity Theft
o Social Engineering Countermeasures
o Penetration Testing
Denial-of-Service
o DoS/DDoS Concepts
o DoS/DDoS Attack Techniques
o Botnets
o DDoS Case Study
o DoS/DDoS Attack Tools
o Counter-measures
o DoS/DDoS Protection Tools
o DoS/DDoS Attack Penetration Testing
Session Hijacking
o Session Hijacking Concepts
o Application Level Session Hijacking
o Network-level Session Hijacking
o Session Hijacking Tools
o Counter-measures
o Session Hijacking Pen Testing
Hacking Webservers
o Webserver Concepts
o Webserver Attacks
o Attack Methodology
o Webserver Attack Tools
o Counter-measures
o Patch Management
o Webserver Security Tools
o Webserver Pen Testing
Hacking Web Applications<
o Web App Concepts
o Web App Threats
o Web App Hacking Methodology
o Web Application Hacking Tools
o Countermeasures
o Security Tools
o Web App Pen Testing
SQL Injection
o SQL Injection Concepts
o Types of SQL Injection
o SQL Injection Methodology
o SQL Injection Tools
o Evasion Techniques
o Counter-measures
Hacking Wireless Networks
o Wireless Concepts
o Wireless Encryption
o Wireless Threats
o Wireless Hacking Methodology
o Wireless Hacking Tools
o Bluetooth Hacking
o Counter-measures
o Wireless Security Tools
o Wi-Fi Pen Testing
Hacking Mobile Platforms
o Mobile Platform Attack Vectors
o Hacking Android OS
o Hacking iOS
o Hacking Windows Phone OS
o Hacking BlackBerry
o Mobile Device Management (MDM)
o Mobile Security Guidelines and Tools
o Mobile Pen Testing
Evading IDS, Firewalls, and Honeypots
o IDS, Firewall and Honeypot Concepts
o IDS, Firewall and Honeypot System
o Evading IDS
o Evading Firewalls
o IDS/Firewall Evading Tools
o Detecting Honeypots
o IDS/Firewall Evasion Counter-measures
o Penetration Testing
Cloud Computing
o Introduction to Cloud Computing
o Cloud Computing Threats
o Cloud Computing Attacks
o Cloud Security
o Cloud Security Tools
o Cloud Penetration Testing
Cryptography
o Market Survey 2014: The Year of Encryption
o Case Study: Heartbleed
o Case Study: Poodlebleed
o Cryptography Concepts
o Encryption Algorithms
o Cryptography Tools
o Public Key Infrastructure(PKI)
o Email Encryption
o Disk Encryption
o Cryptography Attacks
o Cryptanalysis Tools