Ethical Hacking

Ethical Hacking

The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems.

1. Ethical Hacking Module

  • Introduction
  • Linux Basics
  • Network Penetration Testing
  • Pre Connection Attacks
  • Gaining Access (WEPWPAWPA2 Cracking)
  • Post Connection Attacks

2. Application Security

  • SQL Injection
  • Cross-site Scripting
  • Exploits
  • Security Miss-configuration
  • Cache and Cookie
  • Website Penetration Testing
  • Website Pentesting - Information Gathering
  • Website Pentesting - File Upload, Code Execution & File Inclusion Vulns
  • Website Pentesting - SQL Injection Vulnerabilities
  • Website Pentesting - Cross Site Scripting Vulnerabilities
  • Website Pentesting - Discovering Vulnerabilities Automatically Using OWASP ZAP

3. Network Security

  • Routers - Port and Vulnerability scanning
  • Firewalls
  • NBF and HBF
  • Windows Firewalls and Linux Firewalls
  • IDS and IPS
  • Network Attacks Architecture and Isolation
  • Wireless Hacking and Wi-Fi Security
  • Network Monitoring for Threats
  • How We Are Tracked Online
  • Search Engines and Privacy
  • Browser Security and Tracking Prevention
  • Passwords and Authentication Methods

4. Security Intelligence

  • IBM QRadar SIEM(Security Intelligence and Event Management)
  • IBM Qradar Community Edition
  • Windows Servers 2008-R2 Wincollect