Introduction To Ethical Hacking – Information Security Overview. Information Security Threats and Attack Vectors. Hacking Concepts, Types, and Phases. Ethical Hacking Concepts and Scope
Footprinting And Reconnaissance – Concepts. Methodology. Tools. Countermeasures
*** Linux System Administration – Basics – Introduction to Linux. User and Group Accounts. Partitions and Filesystem. Manage Files. Permissions and Ownership. Printing Files. Managing Packages. Kernel Services. Bash Shell and Shell Scripts. Jobs and Processes. System Services.Network Services. Configuring Basic Internet Services. Linux Security.
Scanning Networks – Overview of Network Scanning. Scanning Methodology.
Enumeration – Enumeration Concepts. Enumeration Concepts and Types: NetBIOS, SNMP, LDAP, NTP, SMTP. Enumeration Countermeasures
System Hacking – Information at Hand Before System Hacking Stage. System Hacking: Goals. Hacking Methodology. System Hacking Steps. Hiding Files Covering Tracks
Malware Threats – Introduction to Malware. Trojan Concepts. Types of Trojans. Virus and Worms Concepts. Malware Reverse Engineering. Malware Detection. Countermeasures. Anti-Malware Software
Sniffing – Sniffing Concepts. MAC Attacks. DHCP Attacks. ARP Poisoning. Spoofing Attack. DNS Poisoning. Sniffing Tools. Countermeasures. Sniffing Detection Techniques
Social Engineering – Social Engineering Concepts. Social Engineering Techniques. Impersonation on Social Networking Sites. Identity Theft. Countermeasures.
Denial-Of-Service – DoS/DDoS Concepts. DoS/DDoS Attack Techniques. Botnets. DoS/DDoS Attack Tools. Countermeasures
Session Hijacking – Session Hijacking Concepts. Application Level Session Hijacking. Network-level Session Hijacking. Session Hijacking Tools. Countermeasures
Hacking Webservers – Webserver Concepts. Webserver Attacks. Attack Methodology. Webserver Attack Tools. Countermeasures. Patch Management. Webserver Security Tools
Hacking Web Applications – Web App Concepts. Web App Threats. Web App Hacking Methodology. Web Application Hacking Tools. Countermeasures. Security Tools
*** SQL – Basics
SQL Injection – SQL Injection Concepts. Types of SQL Injection. SQL Injection Methodology. SQL Injection Tools. Evasion Techniques. Countermeasures
Hacking Wireless Networks – Wireless Concepts. Wireless Encryption. Wireless Threats. Wireless Hacking Methodology. Wireless Hacking Tools. Bluetooth Hacking. Countermeasures. Wireless Security Tools
Hacking Mobile Platforms – Mobile Platform Attack Vectors. Hacking Android OS. Hacking iOS. Mobile Security. Guidelines and Tools
Evading Ids, Firewalls, And Honeypots – IDS, Firewall and Honeypot Concepts. IDS, Firewall and Honeypot System. Evading IDS. Evading Firewalls. IDS/Firewall Evading Tools. Detecting Honeypots. Countermeasures
Cloud Computing – Introduction to Cloud Computing. Cloud Computing Threats. Cloud Computing Attacks. Cloud Security. Cloud Security Tools
Cryptography – Cryptography Concepts. Encryption Algorithms. Cryptography Tools. Public Key Infrastructure(PKI). Email Encryption. Disk Encryption. Cryptography Attacks. Cryptanalysis Tools
***Kali Linux – Offensive security
Note: Exercises marked with *** will be done depending of the level of knowledge of the group.