Welcome to YLOAN.COM
yloan.com » College-University » Ceh,learn Ethical Hacking,hacking Workshop,learn Hacking.
College-University Vocational-Trade-Schools Root Category Home-Schooling scholarships books certification students

Ceh,learn Ethical Hacking,hacking Workshop,learn Hacking.

We are Ec- Council Authorized training Partner; The International Council of E-Commerce

Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and information security skills. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many others programs, that are offered in over 60 countries through a training network of more than 450 training partners globally.

Ec-council received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). And the United States Department of Defense has included the CEH program into its Directive 8570, making it as one of the mandatory standards to be achieved by Computer Network Defenders Service Providers (CND-SP)

Term & Conditions:

Jodo Institute responsibility: Impart training on workshop and Guide the students for future in Security.


College management/organizer: Requirements for workshop:

Seminar Hall

Two cordless Mikes

2 LCD projectors

Internet Connection

2 Volunteers

Accommodation for two Security Consultants in College.

Workshop Duration:

16 hours (2 Days)

Workshop Curriculum:

PART I Ethics

Why is Security needed?

What is ethical hacking?

Ethical Hacker vs Malicious Hacker

Types of Hackers

Building an approach for ethical hacking

PART II Google Hacking

What is Google?

How does Google work?

Google Tricks

Basic Hacks

Google Calculator

GoogleNews

Google Tools

How can Google hacking help an ethical hacker?

.Preventing Google Crawls

Practical Class: Case Studies

PART III Scanning

What is Scanning?

Objectives of Scanning

Practical Class

Scanning Tools to be used:

Nmap

Null Scan

Firewalk

XMAS Scan

NIKTO

GFI Languard

PART IV Email Hacking

How does Email work?

Tracing an Email

Spam

What is Spamming?

Methods of Prevention

Laws about Spamming

Fake Emails

Detecting Fake Emails

Tracing Server variables through

Part V Trojans

Definition

Legend

Difference b/w Trojan, virus and worms

Working of Trojans

Server, Client, Direct & Reverse connections

Trojan Practical

Beast, Bandook etc.

Both direct and reverse connection

Trojans on WAN

Problems Dynamic IP

NAT

Using netcat as a Trojan

Antivirus Detection process

Heuristics, signatures

Hex editing, source code changes, custom, binders, packers, DLL injection

Social Engineering Deploying Trojans

Manual Detection

TCP-view, process monitors

Part VI Session Hijacking

Understanding Sessions

Passive vs. Active session hijack

TCP sessions and HTTP sessions

TCP session hijacking Telnet

Stealing Cookies to Hijack Session ID -XSS

Part VII PHP Injection

Understanding Sever side scripting

Using code-injection to escalate privileges

Briefings on PHP, ASP etc.

Coding PHP shell

Using PHP shells

Exploiting file upload vulnerability

PHP vulnerable functions and safe mode

Prevention of code injection

Part VIII SQL Injection

Defining SQL

Understanding web application

Using SQL to login via middleware language

Checking SQL Injection vulnerability

URL and forms

SQL query SELECT, DROP etc.

SQL cheat sheets

Using source changes to bypass client side validation

PHP magic quotes

Using SQL injection tools

Importance of Server side validation

Part IX Sniffing

Introduction

Active, Passive

DNS, ARP

Tools

Wireshark, Ettercap Cain n Abel

Detecting Sniffing

DNS Poisoning

Router Hacking

Emulating WAN sniffing

Part X Bluetooth Hacking

Bluetooth Introduction

Security Issues

Security Attacks

Bluejacking

Tools for Bluejacking

Tools for Bluejacking

BlueSpam

Blue snarfing

BlueBug Attack

Short Pairing Code Attacks

Man-In-Middle Attacks

OnLine PIN Cracking Attack

BTKeylogging attack

BTVoiceBugging attack

Blueprinting

Bluesmacking -The Ping of Death

Denial-of-Service Attack

BlueDump Attack

Part XICryptography

Introduction to Cryptography

ClassicalCryptographic Techniques -Encryption/Decryption

Cryptographic Algorithms

RSA (Rivest Shamir Adleman)

Example of RSA Algorithm

-RSA Attacks

-RSA Challenge

Data Encryption Standard (DES)

DES Overview

RC4, RC5, RC6, Blowfish

One-way Bash Functions -MD5

SHA (Secure Hash Algorithm)

SSL (Secure Sockets Layer)

What is SSH?

SSH (Secure Shell)

Algorithms and Security

Disk Encryption

Government Access to Keys (GAK)

Code Breaking: Methodologies

Cryptanalysis

Cryptography Attacks

vBrute-Force Attack

Cracking S/MIME Encryption Using Idle CPU Time

Use Of Cryptography

Part XIISocial Networking Sites & Hacking

Impersonating Orkut, Facebook, MySpace

Orkut

Impersonating on Orkut

MW.Orc worm

Facebook

Impersonating onFacebook

MySpace

Impersonating on MySpace

How to Steal Identity

Comparison

Original

Identity Theft

http://www.consumer.gov/idtheft/

Part XIII: Malicious Hacking

Yahoo booters

Crawlers

Remote File Inclusion

Local File Inclusion


Backdoor Shells

Trojan Writing in C, C++

PHP Injection

by: Mohit Yadav --JODO INSTITUTE ---9891773445
Hacking Workshop,learn Hacking, Ceh,learn Ethical Hacking No More Blemish Face - Learn How You Can Get rid of Your Scary Face Mcse 70-291 Exam Nowaday Easy Scholarships For College - An Easy Way to Get Scholarship Money For Free In the Bible versus the Quran: He Learned to Hunt; He Ate People Distance Learning: Is It Really Appropriate For You? How To Learn Simple php Learning The Consequences Of The Various Eating Disorders Money To Help You Go To College: Obama Grants Effective Leadership Skills - Leaders Learn Best on the Job If You Want More GACE Test Points, Just Bust GACE Study Guide Myths! TExES Exam Takers React to Shocking TExES Exam Study Guide Report Why Not Try Learning To Kitesurf?
print
www.yloan.com guest:  register | login | search IP(216.73.216.16) California / Anaheim Processed in 0.019512 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 348 , 6626, 249,
Ceh,learn Ethical Hacking,hacking Workshop,learn Hacking. Anaheim