Information Security Fundamentals
- Information Security Fundamentals
- Information Security Laws and Regulations
Ethical Hacking Fundamentals
- Cyber Kill Chain Methodology
- Hacking Concepts and Hacker Classes
- Different Phases of Hacking Cycle
- Ethical Hacking Concepts, Scope, and Limitations
- Ethical Hacking Tools
Lab Exercise:
- Passive Footprinting to Gather Information About a Target
- Network Scanning to Identify Live Hosts, Open Ports and Services and Target OS in the Network
- Enumeration on a System or Network to Extract Usernames, Machine Names, Network Resources, Shares, etc
Information Security Threats and Vulnerability Assessment
- Threat and Threat Sources
- Malware and its Types
- Malware Countermeasures
- Vulnerabilities
- Vulnerability Assessment
Lab Exercise:
- Vulnerability Assessment to Identify Security Vulnerabilities in the Target System or Network
Password Cracking Techniques and Countermeasures
- Password Cracking Techniques
- Password Cracking Tools
- Password Cracking Countermeasures
Lab Exercise:
- Perform Active Online Attack to Crack the System’s Password
- Audit System Passwords
Social Engineering Techniques and Countermeasures
- Social Engineering Concepts and its Phases
- Social Engineering Techniques
- Insider Threats and Identity Theft
- Social Engineering Countermeasures
Lab Exercise:
- Social Engineering using Various Techniques to Sniff Users’ Credentials
- Detect a Phishing Attack
Network Level Attacks and Countermeasures
- Packet Sniffing Concepts
- Sniffing Techniques
- Sniffing Countermeasures
- DoS and DDoS Attacks
- DoS and DDoS Attack Countermeasures
- Session Hijacking Attacks
- Session Hijacking Attack Countermeasures
Lab Exercise:
- Perform MAC Flooding to Compromise the Security of Network Switches
- Perform ARP Poisoning to Divert all Communication between Two Machines
- Detect ARP Attacks using ARP Spoofing Detection Tools to Ensure Data Privacy
- Perform DoS and DDoS Attacks using Various Techniques on a Target Host to Prevents Access to System Resources for Legitimate Users
- Detect and Protect Against DDoS Attack
- Perform Session Hijacking to Seize Control of a Valid TCP Communication Session Between Two Computers
- Detect Session Hijacking Attempts using Manual Method
Web Application Attacks and Countermeasures
- Web Server Attacks
- Web Server Attack Countermeasures
- Web Application Architecture and Vulnerability Stack
- Web Application Threats and Attacks
- Web Application Attack Countermeasures
- SQL Injection Attacks
- SQL Injection Attack Countermeasures
Lab Exercise:
- Perform a Web Server Attack to Crack FTP Credentials
- Perform a Web Application Attack to Compromise the Security of Web Applications to Steal Sensitive Information
- Perform SQL Injection Attacks on a Target Web Application to Manipulate the Backend Database
- Detect SQL Injection Vulnerabilities using SQL Injection Detection Tools
Wireless Attacks and Countermeasures
- Wireless Terminology
- Wireless Encryption
- Wireless Network-Specific Attack Techniques
- Bluetooth Attacks
- Wireless Attack Countermeasures
Lab Exercise:
- Perform Wi-Fi Packet Analysis
- Perform Wireless Attacks to Crack Wireless Encryption
Mobile Attacks and Countermeasures
- Mobile Attack Anatomy
- Mobile Platform Attack Vectors and Vulnerabilities
- Mobile Device Management (MDM) Concept
- Mobile Attack Countermeasures
Lab Exercise:
- Hack an Android Device by Creating Binary Payloads
- Secure Android Devices using Various Android Security Tools
IoT and OT Attacks and Countermeasures
- IoT Concepts
- IoT Threats and Attacks
- IoT Attack Countermeasures
- OT Concepts
- OT Threats and Attacks
- OT Attack Countermeasures
Lab Exercise:
- Perform Footprinting using Various Footprinting Techniques
- Capture and Analyze IoT Device Traf
Cloud Computing Threats and Countermeasures
- Cloud Computing Concepts
- Container Technology
- Cloud Computing Threats
- Cloud Attack Countermeasures
Lab Exercise:
- Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools
- Exploit S3 Buckets
Penetration Testing Fundamentals
- Fundamentals of Penetration Testing and its Benefits
- Strategies and Phases of Penetration Testing
- Guidelines and Recommendations for Penetration Testing