Ethical Hacking Syllabus
Embedded / VLSI Training & Development Organisation - NANO CDAC
ETHICAL HACKING
1. Introduction to Ethical Hacking
- Overview Of Ethical Hacking
- Hackers Vs Ethical Hackers
- Different Types Of Hackers
- World Top Hacker's History
- Terminologies used in Hacking
- Skills Required To Become a Hacker
2. Foot printing, Information Gathering, Reconnaissance
- What is Information Gathering
- Active & Passive Information Gathering
- Google as a Information Gathering Agent
- Addons and Tool Based Footprinting
- Site For Footprinting
3. Hiding Identity(Proxy & vpn)
- Over view of proxy
- Online Proxy
- Proxy Tools
- VPNs & Bypass Restrictions Using Proxy and VPNs
4. Scanning & Enumeration
- Overview of TCP/IP 3 way Handshake
- Nmap scanning methods
- Nmap Script Engine
- Online Scanning
- Some useful scanners
- Introduction to Enumeration
- SNMP Enumeration
- Banner grabbing
5. Advance Google Database Hacking
- Google and Its Working
- Dork For Google Hacking
- Tools For Google Hacking
- Web Crawling Tools
- Digging Email Passwords
6. System Virtualization & Cloning
- Virtualization
- Vmware
- VirtualBox
- Backup & Restore
- Cloning
7. System and Application Password Hacking
- Password Cracking
- Password Resetting
- Login Without Entering Password
- Linux password Resetting
- Password In Plain Text
- Securing System
- Rar,Pdf, MsOffice & Zip password cracking
8. Kali Linux
- Introduction to Kali Linux
- Installation, Configuration and Maintenance
- Top 10 tools & Some other Useful Tools
9. Steganography & Cryptography
- Introduction to Stenography & Cryptography
- Data Hiding Behind Images, Videos Files Etc
- Data Hiding Tools
- ADS
- Cryptography
10. Viruses, Trojans, Worms and Malwares
- Introduction to viruses, worms, and Trojans
- Hacking by using some viruses, Trojans and worms
- Botnets
- Key logging
- Overview Of Malware Analysis
- Countermeasures
11. Email Hacking & Tracing Victim
- Phishing attack
- Tracing Victim
- Fake profile Investigating
- Profile Security
12. Network Attacks & Security
- DOS & DDOS Attack
- Buffer overflow (Brief Intro)
- Sniffing
- IDS and Honeypot
13. Website Hacking
- Bypass Authentication
- SQL Injection
- Dumping Passwords
- Countermeasures
14. Wireless Password Cracking
- WEP Cracking
- WPA/WPA2 Password Cracking
- WI-FI Router Password Cracking
15. Vulnerability Assessment
- Introduction to VA-PT
- Nessus
- Acunetix
- Netsparker
- IBM AppScan