Ethical Hacking

My Table

Unit 1

S No. Course Content:
0 Ethical Hacking
1 Hacking Impacts
2 The Hacker Framework: Planning the test
3 Sound Operations
4 Reconnaissance
5 Enumeration
6 Vulnerability Analysis
7 Exploitation
8 Final Analysis
9 Deliverable
10 Integration Information Security Models: Computer Security
11 Network Security
12 Service Security
13 Application Security
14 Security Architecture Information Security Program: The Process of Information Security
15 Component Parts of Information Security Program
16 Risk Analysis and Ethical Hacking


Unit 2

S No. Course Content:
1 The Business Perspective: Business Objectives
2 Security Policy
3 Previous Test Results
4 Business Challenges Planning for a Controlled Attack: Inherent Limitations
5 Imposed Limitations
6 Timing is Everything
7 Attack Type
8 Source Point
9 Required Knowledge
10 Multi-Phased Attacks
11 Teaming and Attack Structure
12 Engagement Planner
13 The Right Security Consultant
14 The Tester
15 Logistics
16 Intermediates
17 Law Enforcement


Unit 3

S No. Course Content:
1 Preparing for a Hack: Technical Preparation
2 Managing the Engagement Reconnaissance: Social Engineering
3 Physical Security
4 Internet Reconnaissance


Unit 4

S No. Course Content:
1 Enumeration: Enumeration Techniques
2 Soft Objective
3 Looking Around or Attack
4 Elements of Enumeration
5 Preparing for the Next Phase Exploitation: Intutive Testing
6 Evasion
7 Threads and Groups
8 Operating Systems
9 Password Crackers
10 RootKits
11 applications
12 Wardialing
13 Network
14 Services and Areas of Concern


Unit 5

S No. Course Content:
1 Deliverable: The Deliverable
2 The Document
3 Overal Structure
4 Aligning Findings
5 Presentation Integration: Integrating the Results
6 Integration Summary
7 Mitigation
8 Defense Planning
9 Incident Management
10 Security Policy