You are on page 1of 4

Information Security and Ethical Hacking

Introduction 1. Why security. PC SECURITY Virus and Worms (Malware). 1. 2. 3. 4. Introduction. Types of Virus & Worms. Classifications of Malware. Countermeasures.

Trojans and Backdoors 1. 2. 3. 4. Introduction. Types of Trojans. Auto runs files. Countermeasures.

NETWORK SECURITY Networking Basics. 1. 2. 3. 4. 5. 6. 7. What is Network? Types of Network and Network Devices. Ports. Protocols. IP Addressing. Domain DNS. Linux

Proxy Servers and Packet Filters. 1. 2. 3. 4. 5. Introduction. Advantages of Proxy Servers. Types of Proxy Servers. Bypassing Proxy Servers. Countermeasures.

Firewall 1. 2. 3. 4. 5. Introduction. Types of firewall. Advantages and Disadvantages. Bypassing firewalls. Honeypots.

Intrusion Detecting System 1. 2. 3. 4. 5. 6. Introduction. Different between an IDS and Firewall. Advantages. Types of IDS. IPS. Different between IDS and IPS.

Wireless Security 1. 2. 3. 4. 5. 6. Understanding wireless Technology. Wireless Network Setup. Wireless Standards. Types of wireless network layout. Scanning and detecting a wireless Network. Wireless Security.

Physical Site Security OTHER SECURITY ISSUES Windows Security. 1. 2. 3. 4. 5. Password. Types of password Attacks. Password Countermeasures. Hiding Files. Key loggers. 1. Introduction. 2. Types of Key Loggers.

Linux Security. 1. 2. 3. 4. Introduction. Advantages and Disadvantages of Linux Password Hacking. Countermeasures.

Web Server Security. 1. 2. 3. 4. 5. Introduction. How web server works. Vulnerabilities of web server. Common Security Threats. Countermeasures.

Steganography and Seganalysis 1. 2. 3. 4. Introduction. How it works. Hiding Technique. Methods of Detection.

Cryptography 1. 2. 3. 4. Introduction. Cryptography Attacks. Cracking Encryption. Disk Encryption.

Reverse Engineering 1. Introduction 2. Uses of Reverse Engineering 3. Legality ETHICAL HACKING Introduction 1. 2. 3. 4. 5. 6. Introduction. Types of Hackers/Ethical Hacker. Specializations. What does Malicious Hacker do? What does Ethical Hacker do? Basic Terminology

Information Gathering (Foot printing) 1. Introduction. 2. Benefits. 3. Techniques Scanning 1. 2. 3. 4. 5. Introduction. Types of Scanning. Objective Scanning. Network Scanning and Port Scanning. Scanning Types.

Gaining Access 1. Introduction. 2. Attacking Layers. Sniffers 1. 2. 3. 4. 5. 6. Introductions. Types of Sniffers. ARP Poisoning. DNS spoofing. Spoofing. Countermeasures.

Session Hijacking. 1. Introduction. 2. Types of Hijacking. 3. Countermeasures Email Hacking 1. 2. 3. 4. Introduction Spam and Spam Laws Hacking into Email Account Securing Email Account

Buffer Overflow 1. Introduction 2. Buffer Overflow Attack 3. Countermeasures Exploit Writing 1. Introduction 2. Purpose 3. Types of Exploit writing Social Engineering. 1. 2. 3. 4. Introduction. Techniques of Social Engineering Social Engineering sites. Countermeasures.

Denial of Service. 1. 2. 3. 4. 5. Introduction. Symptoms. Goals of DOS attack. Types of attacks. Countermeasures.

Maintaining Access Covering Tracks Reporting Vulnerability Penetration Testing. 1. 2. 3. 4. Introduction Types of Testing Risks Involved Testing Methodologies