- Important Terminology
- Components of Information Security
- Functionality, Usability, and Security
- Home
- Mindmajix Technologies
- Courses
- Ethical Hacking Training in Bangalore
Online
₹ 11,200 14,000
Quick facts
particular | details | ||
---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study, Virtual Classroom
|
Mode of Delivery
Video and Text Based
|
Frequency of Classes
Weekdays, Weekends
|
Course and certificate fees
Fees information
₹ 11,200 ₹14,000
certificate availability
Yes
certificate providing authority
Mindmajix Technologies
The syllabus
Module 1: Introduction to Information Security
Chapter 1.1: Information Security Overview
Chapter 1.2: Information Security Attack and Threats vendors
- Objectives of the Information Security Attacks
- Kinds of Information Security Threat
- Kinds of Attacks on the System
- Best Information Security Attack Vendors
- Information warfare
Chapter 1.3: Hacking
- Define Hacking
- Hacker Classes
- Hacker Phases
- Reconnaissance
- Scanning
- Gaining and Maintaining Access
- Clearing Tracks
Chapter 1.4: Ethical Hacking Concepts
- Define Ethical Hacking
- Importance of Ethical Hacking
- Extent and Restrictions of Ethical Hacking
- Expertise of an Ethical Hacker
Chapter 1.5: Controls of Information Security
- Information Assurance
- Information Security Management Program
- Enterprise Information Security Architecture
- Network Security Zoning
- Policies of Information security
- Kinds of Security Policies
- Security Policies examples
- Creating and Implementing Security Policies
- Private policies at office
Chapter 1.6: Physical Security
- Kinds of Physical Security Control
- Physical Security Control
Chapter 1.7: Risk
- Risk Management
- Important Roles and Functions in Risk Management
Chapter 1.8: Threat Modeling
Chapter 1.9: Incident Management
Module 2: FootPrinting and Reconnaissance
Chapter 2.1: FootPrinting Concepts
- Define FootPrinting
- Intent of FootPrinting
Chapter 2.2: FootPrinting through the Search Engines
- FootPrinting using search engines and modern Google Hacking Techniques
- Collecting Information through Google Advanced Search and Image Search
- Google Hacking Database
- VPN and VoIP FootPrinting through the Google Hacking Database
Chapter 2.3: FootPrinting using Web Services
- Discovering the Organization's Top-Level Domains and Sub-domains
- Discovering the Geographical location of the Intent
- People Search on People Search Sites and Social Networking Sites
- Collecting Information from LinkedIn and Financial Services
- FootPrinting using Job sites
- Monitoring Target through Alerts
- Collecting Information through Groups, Forms, and Blogs
Chapter 2.4: Website FootPrinting and Email FootPrinting
- Website FootPrinting through Web Spiders
- Mirroring Entire website and Fetching website information from www.archieve.org
- Fetching Metadata of Public Documents and Controlling the web pages for changes and updates.
- Tracing Email Communication
- Gathering Information from the Email Header
- Email Tracking Tools
Chapter 2.5: DNS FootPrinting and Network FootPrinting
- Fetching DNS Information and DNS examination tools
- Finding the Network Range
- Traceroute and Traceroute Tools
Chapter 2.6: FootPrinting Tools
- Maltego and Recon-ng
- FOCA and Recon-Dog
- OSRFramework and Other FootPrinting Tools
Chapter 2.7: FootPrinting Counterattacks and Pen Testing
- FootPrinting Counterattacks
- FootPrinting Report Templates
Module 3: Network Scanning
Chapter 3.1: Network Scanning Basics
- Network Scanning Overview
- TCP communication flags
- TCP/IP communication
- Setup custom packet through TCP flags
- Scanning in IPV6 Networks
Chapter 3.2: Network Scanning Tools
- Nmap
- Hping2/Hping3
- Scanning Tools for Web and Mobile
Chapter 3.3: Network Scanning Techniques
- Scanning Techniques
- Port scanning Counterattacks
Chapter 3.4: Network Diagrams
- Drawing Network Diagrams
- Network Discovery and Mapping Tools
- Network Discovery Tools for Mobile
Chapter 3.5: Scanning IDS, Firewall, and Pen Testing
- IDS or Firewall Evasion Techniques
- Scanning Pen Testing
Module 4: Enumeration
Chapter 4.1: Enumeration Basics
- Define Enumeration
- Enumeration Techniques
- Ports and Services to Enumerate
Chapter 4.2: NETBIOS Enumeration
- NETBIOS Enumeration Tool
- Enumerating user Accounts and Shared Resources
Chapter 4.3: SNMP and LDAP Enumeration
- Working of SNMP Enumeration
- Management Information Base
- SNMP Enumeration Tools
- LDAP Enumeration Tools
Chapter 4.4: NTP Enumeration, SMTP Enumeration, and DNS Enumeration
- NTP Enumeration Commands and Tools
- SMTP Enumeration Tools
- DNS Enumeration through Zone Transfer
Chapter 4.5: Additional Enumeration Techniques
- IPsec Enumeration
- VoIP Enumeration
- RPC Enumeration
- Linux/Unix user Enumeration
Chapter 4.6: Enumeration Counterattacks and Pen Testing
- Enumeration Counterattacks
- Enumeration Pen Testing
Module 5: Vulnerability Analysis
Chapter 5.1: Vulnerability Assessment Concepts
- Vulnerability Analysis
- Vulnerability Categorization
- Kinds of Vulnerability Assessment
- Vulnerability Management Life cycle
Chapter 5.2: Vulnerability Assessment Solutions
- Contrasting Approaches for Vulnerability Assessment
- Vulnerability Scanning Solutions working
- Kinds of Vulnerability Assessment Tools
- Characteristics of a Good Vulnerability Assessment Solution
- Selecting a Vulnerability Assessment Tool
- Criteria or Standards for selecting a Vulnerability Assessment Tool
- Best methods for Choosing Vulnerability Assessment Tools
Chapter 5.3: Vulnerability Scoring Systems
- Common Vulnerability Scoring System(CVSS)
- Common Vulnerabilities and Exposures(CVE)
- National Vulnerability Database
- Vulnerability Research Resources
Chapter 5.4: Vulnerability Assessment Tools
- Nessus Professional
- GFI LanGuard
- Qualys Vulnerability Management
- Qualys FreeScan
- Nikto
- Retina CS
- OpenVAS
- SAINT
- Microsoft Baseline Security Analyzer
- Automated Vulnerability Detection System
- Vulnerability Assessment Tools for Mobile
Chapter 5.5: Vulnerability Assessment Reports
- Vulnerability Assessment Reports Basics
- Analyzing the Vulnerability Scanning Reports
Module 6: System Hacking
- Chapter 6.1: CEH Hacking Methodology(CHM)
- Chapter 6.2: System Hacking Objectives
- Chapter 6.3: Password Cracking
Chapter 6.4: Kinds of Password Attacks
- Non-Electronic Attack
- Active Online Attack
- Passive Online Attack
- Chapter 6.5: Password Recovery Tools
- Chapter 6.6: Microsoft Authentication
- Chapter 6.7: Storing Hash Passwords in Windows SAM
- Chapter 6.8: NTLM Authentication Process
- Chapter 6.9: Kerberos Authentication
- Chapter 6.10: Password Salting and Cracking Tools
- Chapter 6.11: Tools for Extracting the Password Hashes
- Chapter 6.12: How to Defend against LLMNR/NBT-NS Poisoning and Password Cracking
- Chapter 6.13: Escalating Privileges
- Chapter 6.14: Tools to Execute Applications
- Chapter 6.15: Keylogger
- Chapter 6.16: Spyware
- Chapter 6.17: How to Defend against Keylogger and Spyware
Chapter 6.18: RootKits
- Kinds of RootKits
- RootKits working
- Steps to Detect RootKits
- Defend Against RootKits
- Anti-RootKits
Chapter 6.19: NTFS Data Stream
- Creating NTFS Streams
- Manipulating NTFS Streams
- Defend Against NTFS Streams
- NTFS Stream Detectors
Chapter 6.20: Steganography
- Categorization of Steganography
- Kinds of Steganography
- Document Steganography
- Video and Audio Steganography
- Email/Spam Steganography
- Folder Steganography
- Image Steganography Tools
- Whitespace Steganography
- Steganography Tools for Mobile Phones
- Steganalysis
- Steganalysis Methods and Attacks on Steganalysis
- Detecting Steganography
- Steganography Detection Tools
Chapter 6.21: Covering Tracks
- Deactivating Auditing: Auditpol
- Clearing Logs
- Covering Tracks
- Covering Tracks tools
- Covering Tracks on OS and Network
- Covering Tracks Tools
Module 7: Malware Threats
Chapter 7.1: Malware Fundamentals
- Introduction to Malware
- Different methods by which Malware can get into a system
- General Techniques which Attackers use for Distributing the Malware on the web
- Components of Malware
Chapter 7.2: Trojan Basics
- Define Trojans
- How Hackers use Trojans
- General Ports used by the Trojans
- How to Infect systems through a Trojan
- Trojan Horse Construction Kit
- Wrappers and Crypters
- How Attackers Deploy the Trojan
- Avoiding Anti-virus Techniques
- Kinds of Trojans
- Remote Access Trojans
- BotNet Trojans
- Backdoor Trojans
- RootKit Trojans
- E-banking Trojans
- Proxy Trojans
- Mobile Trojans
- IoT Trojans
- Exploit Kits
Chapter 7.3: Worms and Virus Concepts
- Virus Basics
- Stages of Virus life
- Working with Viruses
- Signs of Virus Attack
- How Virus Infects a computer
- Virus Hoaxes
- Fake Antivirus
- Ransomware
- Kinds of Viruses
- Creating Virus
- Computer Worms and Worm Makers
Chapter 7.4: Malware Analysis
- Sheep Dip Computer
- Anti-Virus Senor Systems
- Malware Analysis Basics
- Preparing Testbed
- Static and Dynamic Malware Analysis
- Virus Detection Ways
- Trojan Analysis: ZeuS/Zbot
- Virus Analysis: WannaCry
Chapter 7.5: Counterattacks
- Trojan and Backdoor Counterattacks
- Virus and Worms Counterattacks
Chapter 7.6: Anti-Malware Software
- Anti-Trojan and Antivirus software
Chapter 7.7: Malware Penetration Testing
Module 8: Sniffing
Chapter 8.1: Sniffing Basics
- Network Sniffing
- Basics of Sniffing
- How an attacker uses Sniffing to Hack the Network
- Protocols exposed to Sniffing
- Sniffing in the Data Link Layer
- Hardware Protocol Analyzers
- SPAN Port
- Wiretapping and Lawful Interception
Chapter 8.2: MAC Attacks
- MAC Address or CAM Table
- CAM Working
- What Happens when the CAM Tables is Full?
- MAC Flooding
- Switch Port Stealing
- Defending MAC Attacks
Chapter 8.3: Sniffing Technique: DHCP Attacks
- DHCP Working
- DHCP Request/Reply Messages
- DHCP Starvation Attack
- Rogue DHCP Server Attack
- Defending DHCP Starvation and Rogue Server Attack
Chapter 8.4: Sniffing Technique: ARP Poisoning
- Address Resolution Protocol
- ARP Spoofing Attack
- ARP Poisoning Threats
- ARP Poisoning Tools
- Defending ARP Poisoning
- Dynamic ARP Inspection and Configuring DHCP Snooping
- ARP Spoofing Detection Tools
Chapter 8.5: Spoofing Attacks
- MAC Duplicating/Spoofing
- Windows
- MAC Spoofing Tools
- IRDP Spoofing
- Defending MAC Spoofing
Chapter 8.6: DNS Poisoning and Sniffing Tools
- DNS Poisoning Techniques
- Defending DNS Poisoning
- Wireshark
- Packet Sniffing Tools for Mobile
Chapter 8.7: CounterAttacks and Sniffing Detection Techniques
- Defending Sniffing
- Detect Sniffing
- Sniffer Detection Techniques
- Promiscuous Detection Tools
- Sniffing Penetration Testing
Module 9: Social Engineering
Chapter 9.1: Social Engineering Basics and Techniques
- Define Social Engineering
- Social Engineering Attack Phases
- Types of Social Engineering
- Human-based and Computer-based Social Engineering
- Mobile-based Social Engineering
Chapter 9.2: Impersonation on Social Networking Sites
- Social Engineering using Impersonation on Social Networking
- Impersonation on Facebook
- Risks of Social Networking Threats for Corporate Networks
Chapter 9.3: Identity Theft and Counterattacks
- Identity Theft concepts
- Social Engineering Counterattacks
- Insider Threats Counterattacks
- Identity Theft Counterattacks
- Detecting Phishing Emails
- Anti-Phishing Toolbar
- General Social Engineering Targets and Defense Strategies
Chapter 9.4: Social Engineering Penetration testing and Insider Threats
- Social Engineering Penetration Testing Tools
- Types of Insider Threats
Module 10: Denial-of-Service(DoS)
Chapter 10.1: DoS and DDoS Concepts
- Define DoS Attack
- What is Distributed Denial-of-Service Attack
Chapter 10.2: DoS and DDoS Attack Techniques
- Basic Classification of DoS and DDoS Attack vendors
- UDP and ICMP Flood Attack
- Ping of Smurf and Death Attack
- SYN Flood Attack
- Fragmentation Attack
- HTTP GET/POST and Slowloris Attacks
- Multi-Vector Attack
- Peer-to-Peer Attacks
- Permanent DoS
- Distributed Reflection Denial-of-Service(DRDoS)
Chapter 10.4: Botnets and DDoS Case Study
- Botnet
- General Botnet Setup
- Botnet Ecosystem
- Scanning methods to Find Vulnerable Machines
- How Malicious Code Propagates?
- Botnet Trojan
- DDoS Attack
- Hackers Advertise Links for Downloading Botnet
- Use of Mobile Devices as Botnets to Launch DDoS Attacks
- Dyn DDoS Attack
Chapter 10.5: DoS and DDoS Attack Tools and Counterattacks
- DoS and DDoS Attack Tools for Web and Mobile
- Detection Techniques
- DoS/DDoS Counterattack Strategies
- DDoS Attack Counterattacks
- Techniques for Defending Botnets
- DoS and DDoS Counterattacks
- DoS and DDoS Protection at ISP level
- Enabling TCP Internet on Cisco IOS Software
Chapter 10.6: DoS and DDoS protection tools and Penetration Testing
- Modern DDoS Protection Appliances
- DoS and DDoS Protection Tools
- DoS and DDoS Attack Penetration Testing
Module 11: Session Hijacking
Chapter 11.1: Session Hijacking Basics
- Define Session Hijacking
- Importance of Session Hijacking
- Session Hijacking Process
- Kinds of Session Hijacking
- Session Hijacking in OSI Model
- Differentiate Hijacking and Spoofing
- Packet Analysis of a Local Session Hijack
Chapter 11.2: Application Level Session Hijacking
- Compromising Session IDs through Sniffing and by Predicting Session Token
- Predicting a Session Token
- Compromising Session IDs through Man-in-the-Middle Attack
- Compromising Session IDs through Man-in-the-Browser Attack
- Compromising Session IDs through Client-side Attacks
- Compromising Session IDs through Client-side Attacks and Cross-site Script Attack
- Compromising Session IDs through Cross-site Request Forgery Attack
- Compromising Session IDs through Session Replay Attack and Session Fixation
- Session Hijacking through Proxy Servers, CRIME Attack, and Forbidden Attack
Chapter 11.3: Network Level Session Hijacking
- TCP/IP Hijacking
- RST and Blind Hijacking.
- UDP Hijacking and IP Spoofing
- MiTM Attack through Forged ICMP and ARP Spoofing
Chapter 11.4: Session Hijacking Tools and Counterattacks
- Session Hijacking Tools for Web and Mobile
- Session Hijacking Detection Methods
- Protecting Session Hijacking
- Session Hijacking prevention methods for web developers and web users
- Session Hijacking Detection Tools
- Approaches for preventing Session Hijacking
- Approaches exposable to Session Hijacking
Chapter 11.5: IPsec
- IPsec Components
- Advantages and Modes of IPsec
- IPsec Architecture
- IPsec Confidentiality and Authentication
- Session Hijacking Prevention Tools and Penetration Testing
Module 12: IDS, Honeypots, and Firewalls
Chapter 12.1: Intrusion Detection System
- How Intrusion Detection System Detects an Intrusion
- Instructions of Intrusions
- Different Kinds of Intrusion Detection Systems
- Different Kinds of IDS Alerts
Chapter 12.2: Firewall
- Firewall Architecture
- Demilitarized Zone
- Different Kinds of Firewalls
- Firewall Technologies
- Packet Filtering Firewall
- Circuit-Level Gateway Firewall
- Application-Level Firewall
- Stateful Multilayer Inspection Firewall
- Application Proxy
- Virtual Private Network(VPN)
- Network Address Translation
- Firewall Restrictions
Chapter 12.3: Intrusion Detection Tools
- Snort
- TippingPoint and AlienVault
- Intrusion Detection Tools for Web and Mobile
Chapter 12.4: Firewalls
- ZoneAlarm Free Firewall and Firewall Analyzer
- Firewalls for Web and Mobile
Chapter 12.5: Honeypots and Honeypot Tools
- Different Kinds of Honeypots
- KFSensor and SPECTER
- Honeypot Tools for Web and Mobile
Chapter 12.5: IDS Evasion Methods
- Insertion Attack
- Evasion
- Denial-of-Service Attack(DoS)
- Obfuscating
- False Positive Generation and Session Splicing
- Fragmentation Attack
- Session Splicing
- Time-to-live Attacks
- Overlapping Fragments
- Invalid RST Packets
- Polymorphic Shellcode
- ASCII Shellcode
- Desynchronization
- Application-Layer Attacks
- Other types of Evasion9966321077
Chapter 12.6: Firewall Evasion Techniques
- Firewall Detection
- IP Address Spoofing
- Source Routing and Tiny Fragments
- Evading Blocked Sites through IP Address and Anonymous Website surfing sites
- Evading Firewall through Proxy server and ICMP Tunneling method
- Evading Firewall through ACK Tunneling and HTTP Tunnelling method
- Evading Firewall through External Systems and MITM Attack
- Evading Firewall through the content
- Evading WAF through XSS Attack
Chapter 12.7: IDS or Firewall Evading Tools
- IDS or Firewall Evasion Tools
- Packet Fragment Generator Tools
Chapter 12.8: Detecting Honeypots
- Detecting and Defeating Honeypots
- Send-Safe Honeypot Hunter - Honeypot Detection Tool
Chapter 12.9: IDS and Firewall Evasion Counterattacks
- Defending IDS Evasion
- Defending Firewall Evasion
Chapter 12.10: Penetration Testing
- Firewall and IDS Penetration Testing
Module 13: Hacking Web Servers
Chapter 13.1: Web Servers Basics
- Web Server operations
- Open source Web Server Architecture
- IIS Web Server Architecture
- Web Server Security Issue
- Why we compromise web servers?
- Effect of Web Server Attacks
Chapter 13.2: Web Server Attacks
- DoS and DDoS Attacks
- DNS Server Hijacking
- DNS Amplification Attack
- Directory Traversal Attack
- Man-in-the-Middle or Sniffing Attack
- Phishing Attacks
- Website Defacement
- Web Server Misconfiguration
- HTTP Response Splitting Attack
- Web Cache Poisoning Attack
- SSH Brute Force Attack
- Web Server Password Cracking
- Web Application Attacks
Chapter 13.3: Web Server Attack Methodology and Web Server Footprinting or Banner Grabbing
- Collecting Information from Robots.txt file
- Web Server Footprinting tools
- Enumerating Web Server Information through Nmap
Chapter 13.4: Website Mirroring and Vulnerability Scanning
- Finding the Default Credentials of Web Server
- Finding the Default Content of Web Server
- Finding Directory Listings of Web Server
- Finding Exploitable Vulnerabilities
Chapter 13.5: Web Server Attack Tools
- Metasploit
- Web Server Attack Tools
Chapter 13.6: Counterattacks
- Locate Web Servers in the Separate Secure Server Security Agent
- Counterattacks
- Detecting Web Server Hacking Attempts
- Defending Web Server Attacks
- Defending HTTP Response and Web Caching
- Defending DNS Hijacking
Chapter 13.7: Patch Management
- Patches and Hotfixes
- Patch Management
- Patch Installation
- Patch Management Tools
Chapter 13.8: Web Server Security Tools
- Web Application Security Scanners
- Web Server Security Scanners
- Web Server Security Tools
Chapter 13.9: Web Server Penetration Testing
- Web Server Penetration Testing concepts
- Web Server Penetration Testing Tools
Module 14: Hacking Web Applications
Chapter 14.1: Web App Concepts
- Web Applications Basics
- Web Application Architecture
- Web2.0 Applications
- Vulnerability Stack
Chapter 14.2: Web App Threats
- OWASP Top 10 Application Security Risks - 2017
- Other Web Application Threats
Chapter 14.3: Hacking Methodology
- Web App Hacking Methodology
- Footprint Web Infrastructure
- Attack Web Servers
- Analyze Web Applications
- Bypass Client-side Controls
- Attack Authentication Mechanism
- Authorization Attack Schemes
- Attack Access Controls
- Attack Session Management Mechanism
- Perform Injection or Input Validation Attacks
- Attack Application Logic Flaws
- Attack Database Connectivity
- Attack Web App Client
- Attack Web Services
Chapter 14.4: Web Application Hacking Tools and Countermeasures
- Web Application Hacking Tools
- Web Application Fuzz Testing
- Source Code Review
- Encoding Schemes
- Defending Injection Attacks
- Web Application Attack Counterattacks
- Defending Web Application Attacks
Chapter 14.5: Web App Security Testing Tools and Web App Pen Testing
- Web App Security Testing Tools
- Web Application Firewall
- Web Application Penetration Testing Framework
Module 15: SQL Injection
Chapter 15.1: SQL Injection Concepts
- Define SQL Injection
- SQL Injection and Server-side Technologies
- Understanding HTTP POST Request and SQL Injection Query
- Example of SQL Injection
Chapter 15.2: Types of SQL Injection and SQL Injection Methodology
- Different Types of SQL Injection
- SQL Injection Methodology
Chapter 15.3: SQL Injection Tools and Evasion Techniques
- SQL Injection Tools for Web and Mobile
- Evading IDS
- Different Types of Signature Evasion Techniques
Chapter 15.4: Counterattacks
- Defendinding SQL Injection Attacks
- SQL Injection Detection Tools
Module 16: Hacking Wireless Networks
Chapter 16.1: Wireless Fundamentals
- Wireless Terminologies
- Wireless Networks and Standards
- Service Set Identifier
- Wi-Fi Authentication Modes
- Wi-Fi Authentication Process through a Centralized Authentication
- Different Types of Wireless Antenna
Chapter 16.2: Wireless Encryption
- Different Types of Wireless Encryption
- WEP vs WPA vs WPA2
- WEP Concerns
- Weak Initialization Vector(IV)
Chapter 16.3: Wireless Threats and Wireless Hacking Methodology
- Wireless Threats
- Wireless Hacking Methodology
Chapter 16.4: Wireless Hacking Tools
- WEP/WPA Cracking Tools
- WEP/WPA Cracking Tool for Mobile
- Wi-Fi Sniffer
- Wi-Fi Traffic Analyzer Tools
- Additional Wireless Hacking Tools
Chapter 16.5: Bluetooth Hacking
- Bluetooth Stack and Hacking
- Bluetooth Threats and Hacking Tools
- How do we BlueJack a Victim?
Chapter 16.6: Counterattacks and Wireless Security Tools
- Wireless Security Layers
- Defending WPA or WPA2 Cracking
- Defending Krack Attacks
- Detecting and Blocking Rogue AP
- Defending Wireless Attacks
- Defending Bluetooth Hacking
- Wireless Intrusion Prevention System
- Wireless IPS Deployment
- Wi-Fi Security Auditing Tool
- Wi-Fi Intrusion Prevention System
- Wi-Fi Predictive Planning Tools
- Wi-Fi Vulnerability Scanning Tools
- Bluetooth Security Tool
- Wi-Fi Security Tools for Mobile
Chapter 16.7: Wi-Fi Penetration Testing
- Wi-Fi Penetration Testing Framework
Module 17: Hacking Mobile Platforms
Chapter 17.1: Mobile Platform Attack Vendors
- Vulnerable Areas in Mobile Business Management
- OWASP Top 10 Mobile Risks
- Anatomy of the Mobile Attack
- How a Hacker can profit from mobile
- Mobile Attack Vectors and Mobile Platform Vulnerabilities
- Security problems emerge from the App Stores
- App sandboxing issues
- Mobile spam and SMS Phishing Attack
- Pairing Mobile Devices on Wi-Fi and Bluetooth Connection
Chapter 17.2: Hacking Android OS
- Android OS and Rooting
- Blocking Wi-Fi Access through NetCut
- Hacking with zANTI
- Hacking Networks through Network Spoofer
- Launching DoS Attack through Low Orbit Ion Cannon(LOIC)
- Performing Session Hijacking through DroidSheep
- Hacking with Orbot Proxy
- Android-based Sniffers and Trojans
- Securing Android Devices
- Android Security Tools
- Android Vulnerability Scanner
- Android Device Tracking Tools
Chapter 17.3: Hacking iOS
- Apple and Jailbreaking iOS
- iOS Trojans
- Standards to Secure iOS Devices
- IOS Device Tracking Tools
- Device Security Tools
Chapter 17.4: Mobile Spyware and Mobile Device Management
- Mobile Spyware: mSpy
- Mobile Spywares
- Mobile Device Management Solutions
- Bring Your Own Device
Chapter 17.5: Mobile Security Guidelines and Tools
- Standards for Mobile Platform Security
- Standards for Administrator
- SMS Phishing Counterattacks
- Mobile Protection Tools
- Mobile Anti-Spyware
Chapter 17.6: Mobile Penetration Testing
- Android and iPhone Penetration Testing
- Mobile Pentesting Toolkit
Module 18: IoT Hacking
Chapter 18.1: IoT Fundamentals
- Define IoT
- How IoT Works?
- IoT Architecture
- IoT Applications and Devices
- IoT Technologies and Protocols
- IoT Communication Models
- IoT Challenges
- Differentiate Threat and Opportunity
Chapter 18.2: IoT Attacks
- IoT Security Problems
- OWASP Best IoT Obstacles and Vulnerabilities
- IoT Attack Surface Areas
- IoT Threats
- Hacking IoT Devices
- IoT Attacks in various cases
Chapter 18.3: IoT Hacking Methodology and IoT Hacking Tools
- IoT Hacking Methodology
- Information Gathering Tools
- Sniffing and Vulnerability Scanning Tools
- Hacking Tools
Chapter 18.4: Counterattacks and IoT Penetration Testing
- Defending IoT Hacking
- Guidelines for IoT Device Manufacturing Companies
- OWASP Best IoT Vulnerabilities Solutions
- IoT Framework Security issues
- IoT Security Tools
- IoT Penetration Testing
Module 19: Cloud Computing
Chapter 19.1: Cloud Computing Basics
- Introduction to Cloud Computing
- Separating Responsibilities in Cloud
- Cloud Deployment Models
- NIST Cloud Computing Reference Architecture
- Cloud Computing Advantages
- Understanding Virtualisation
Chapter 19.2: Cloud Computing Threats and Attacks
- Cloud Computing Threats
- Service Hijacking through Network Sniffing
- Session Hijacking through XSS Attack and Session Riding
- DNS(Domain Name System) Attacks
- Side-Channel Attacks or Cross-guest VM Breaches
- SQL Injection Attacks
- Cryptanalysis and Wrapping Attacks
- Denial-of-Service(Dos) Attacks or Distributed Denial-of-Services Attacks
- Man-in-the-Cloud Attack
Chapter 19.3: Cloud Security and Cloud Security Tools
- Cloud Security Control Layers
- Cloud Security is the responsibility of Cloud Provider
- Cloud Computing Security Issues
- Placement of Security Controls in Cloud
- Best Methods for Securing Cloud
- NIST Recommendations for Cloud Security
- Provider Cloud Security Compliance Checklist
- Cloud Security Tools
Chapter 19.4: Cloud Penetration Testing
- Define Cloud Penetration Testing
- Key Issues for the Cloud Penetration Testing
- Suggestions for Cloud Testing
Module 20: Cryptography
Chapter 20.1: Cryptography Basics and Encryption Algorithms
- Government Access to Keys
- Ciphers
- Data Encryption Standard
- Advanced Encryption Standard
- RC4, RC5, and RC6 Algorithms
- Twofish
- DSA and Related Signature Schemas
- Rivest Shamir Adleman(RSA)
- Diffie-Hellman
- Message Digest Functions
Chapter 20.2: Cryptography Tools
- MD5 Hash Calculators
- Hash Calculators for Mobile
- Cryptography Tools for Web and Mobile
Chapter 20.3: Public Key Infrastructure and Email Encryption
- Public Key Infrastructure
- Digital Signature
- Secure Sockets Layer(SSL)
- Transport Layer Security(TLS)
- Cryptography Toolkit
- Pretty Good Privacy(PGP)
Chapter 20.4: Disk Encryption and Cryptanalysis
- Disk Encryption Tools
- Cryptanalysis Methods
- Code Breaking Methodologies
- Cryptography Attacks
- Cryptanalysis Tools
- Online MD5 Encryption Tools
Chapter 20.5: Counterattacks
- Defending Cryptographic Attacks