Ethical Hacking Syllabus: Rooman Technologies PVT LTD
Ethical Hacking Syllabus: Rooman Technologies PVT LTD
E-mail: [email protected]
Phone: 7022020000
Module 1: Principles of Hacking & Legal Parameters
Ethical Hacking Overviews
Basic Principle
Commandments of Ethical Hacking
Hacking Methodologies
Types of Hacking.
Building the foundation for Ethical hacking
Hacking Phases
Types of Hackers
Roles and Responsibilities
Overview of PT / VA.
Concept of Penetration testing
Types of Penetration testing
Phases of Penetration testing
Vulnerability Assessment by Penetration testing
Module 2 : Viruses, Trojans, Malwares, and OS Level Attacks
and Counter Measures. Malware Analysis.
Malware Overviews
Introduction to Malware.
Different Ways a Malware can Get into a System.
Common Techniques Attackers Use to Distribute Malware on the Web
Components of Malware
Malware Analysis
Introduction to Malware Analysis
Malware Analysis Procedure
Malware Detection Method.
SQL Injection
Basics to the SQL queries
How Injection Can be done
Cross Site Scripting Attacks
DOS Attacks
DoS/DDoS Attack Techniques.
DDoS Case Study
DoS/DDoS Attack Tools
Session Hijacking
Session Hijacking Concepts,
Network Level Session Hijacking
Client side Hijacking.
System Hacking
System Hacking Concepts
Cracking Passwords
Escalating Privileges
Hiding Files and Covering tracks
Injection Flaws
File Injection Attack
Broken Authentication
Sensitive Data Exposure
XML External Entity (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS) Attacks
Insecure Deserialization
Using Components with Known Vulnerabilities
DDos Attack
Jamming Attack
Botnets
Man In middle concept
Data & Identity Theft
▪ Social Engineering
▪ Network sniff
▪ XSS attack
Mobile Hacking
Wireless Overview
Wi-Fi Discovery
GPS Mapping
Traffic canalizing
Launch Wireless attacks
Crack Wi-Fi Encryption
Types of Cryptography
Government Access to Keys (GAK)
Encryption Algorithms
Ciphers
Data Encryption Standard
Advanced Encryption Standard
RC4, RC5, and RC6 Algorithms
Email, Disk Encryption and Cryptanalysis
▪ Brute-Force Attack
▪ Meet-in-the-Middle Attack on Digital Signature Schemes
▪ Side Channel Attack
▪ Hash Collision Attack
▪ DUHK Attack
▪ Rainbow Table Attack
Vulnerability Analysis
Mr. Robot
Installing and working on Kali Linux.
Vulnerability Assessment Concept & Solutions.
Vulnerability Assessment Tools & Reports.