Ethical Hacking Institute™

You are all welcome to the latest blog that is dedicating it's life time in making sure your online accounts are save and secured from the hands of these wicked crackers of our time.You are always welcome to Ethical Hacking Institute Please note that we are not responsible for any form of misuse of information gotten in here.All you will acquire is for educational purpose only

Tuesday 16 August 2011

Becoming A Certified Hacker

1: Introduction to Ethical Hacking
    Why Security?
    The Security, functionality and ease of use Triangle
    Can Hacking be Ethical?
Module 2: Footprinting
    Defining Footprinting
Module 3: Scanning
    Definition of Scanning.
    Types of scanning
Module 4: Enumeration
    What is Enumeration?
    NetBios Null Sessions
Module 5: System Hacking
    Administrator Password Guessing
    Manual Password Cracking Algorithm
    Automated Password Cracking
Module 6: Trojans and Backdoors
    Effect on Business
    What is a Trojan?
Module 7: Sniffers
    Definition of sniffing
    How a Sniffer works?
Module 8: Denial of Service
    What is Denial of Service?
    Goal of DoS(Denial of Service)
Module 9: Social Engineering
    What is Social Engineering?
    Art of Manipulation

Module 10: Session Hijacking

    Understanding Session Hijacking
    Spoofing vs Hijacking
    How Web Servers Work?
Module 11: Hacking Web Servers
    How are Web Servers Compromised?
Module 12: Web Application Vulnerabilities
    Web Application Set-up
    Web Application Hacking
Module 13: Web Based Password Cracking Techniques
    Authentication- Definition
    Authentication Mechanisms
    HTTP Authentication
Module 14: SQL Injection
    Attacking SQL Servers
    SQL Server Resolution Service (SSRS)
Module 15: Hacking Wireless Networks
    Introduction to Wireless Networking
    Business and Wireless Attacks
Module 16: Virus
    Virus Characteristics
    Symptoms of 'virus-like' attack
Module 17: Physical Security
    Security statistics
    Physical Security breach incidents
Module 18: Linux Hacking
    Why Linux?
    Linux basics
Module 19: Evading Firewalls, IDS and Honeypots
    Intrusion Detection Systems
    Ways to Detect Intrusion
Module 20: Buffer Overflows
    Significance of Buffer Overflow Vulnerability
    Why are Programs/Applications Vulnerable?
Module 21: Cryptography
    Public-key Cryptography
    Working of Encryption
Module 22: Penetration Testing Course
    Introduction to Penetration Testing (PT)
Module 23: Advanced Exploit Writing Module 24: Advanced Covert Hacking TechniquesModule 25: Advanced Virus Writing Techniques Module 26: Advanced Reverse Engineering Techniques

1 comment:

Search for Hacking security

Custom Search