Session No.
|
Title
|
Brief Description
|
A-1
|
Ticket (1)
|
Wired and wireless Networks and cellular Networks
|
B-1
|
Ticket (2)
|
Web Technology and programming sites and Database
|
A-2
|
Introduction in Ethical Hacking
|
A look at Information Security, Information Security Threats and Axis of Attack, Hacking phases, Patterns and Principles, Principles and axes of Ethical Hacking - Controls of Information Security, Laws and Parameters of Information Security
|
B-2
|
Fingerprint and reconnaissance
|
Fingerprint principles, Fingerprint methodology, Fingerprint tools, Fingerprint precautionary procedures, Fingerprint penetration test.
|
A-3
|
Network Scanning
|
A look at Network Scanning, Working Systems Detection Techniques, Open Gates Detection Techniques, Scanning Techniques, Evading IDS systems techniques, Banner Grabbing, Vulnerability Scanning, Network Charting, How to Use Proxies and in Attacks, Detection Techniques, Scanning penetration testing.
|
B-3
|
Enumeration
|
Enumeration Principles, NetBIOS Enumeration, SNMP Enumeration, LDAP Enumeration, NTP Enumeration, SMTP and DNS Enumeration - Precautionary Enumeration Procedures, Enumeration Hacking Test
|
A-4
|
Systems Hacking
|
Decoding passwords, Transferring, Executing applications - Hiding files, trace coverage, Hacking Test
|
B-4
|
Malware threats
|
Introduction to malware software, Trojans principles, Principles of viruses and computer worms, Reverse malware software engineering, Malware detection, Preventive measures, Anti-malware programs, Hacking test
|
A-5
|
Sniffing
|
sniffing principles, MAC attacks, DHCP attacks, ARP poisoning, Phishing attack, DNS poisoning, Sniffing tools, Precautionary measures, sniffing detection techniques, sniffing hacking test
|
B-5
|
Social Engineering
|
Principles of social engineering, Social engineering techniques, Impersonation on social networking sites, Identity theft, Precautionary measures, hacking test
|
A-6
|
Denial of Service
|
DoS and DDoS fundamentals, DoS and DDoS attack techniques, Botnets, DDoS case study, DoS and DDoS attack tools, Precautionary measures, DoS and DDoS protection tools, Hacking test
|
B-6
|
Session Hijacking
|
Principles of hijacking session, Session hijacking at the application level, Session hijacking at the network level, Session hijacking tools, Precautionary measures, Hacking test
|
A-7
|
Hacking Web servers
|
Web server principles, Web server attacks, Attack methodology, Web server attack tools, Precautionary measures, Patch management, Web server security tools, hacking testing
|
B-7
|
Hacking Web servers
|
Web application principles, Web application threats, hacking methodology, Web application hacking tools, Precautionary measures, Security tools, Hacking test.
|
A-8
|
SQL Injection
|
SQL injection fundamentals, SQL injection patterns, SQL injection methodology, SQL injection tools, Evasion techniques, Precautionary measures
|
B-8
|
Hacking Wireless Networks
|
Principles of wireless networks, Wireless network encryption, Wireless network threats, Wireless network hacking methodology, Wireless networks hacking tools, Bluetooth hacking, Precautionary measures, Wireless security tools, Wi-Fi hacking test
|
A-9
|
Hacking mobile Platforms
|
Attack axes on mobile phones, Hacking of Android Operating Systems, IOS hacking, hacking of Windows Phone Operating Systems, BlackBerry hacking, Cellular Phone Management, Cellular Phone Security Tools and Guidance, Cellular Phone hacking test
|
B-9
|
Evading IDS, Firewall and Honeypots Technology
|
Principles of IDS, firewall and honeypots systems, IDS solutions, firewalls and honeypots, evading IDS systems, Evading firewalls, IDS and firewall evading tools, honeypots detection, Precautions to avoid IDS and firewall systems, hacking test.
|
A-10
|
Cloud Computing
|
Introduction to cloud computing, Cloud computing threats, Cloud computing attacks, Cloud security, Cloud security tools, Cloud hacking testing.
|
B-10
|
Cryptography
|
Encryption principles, Encryption algorithms, Encryption tools, PKI, Electronic mail encryption, Disk encryption - Encryption attacks, Analysis tools
|