Welcome to YLOAN.COM
yloan.com » College-University » Learn Ethical Hacking,hacking Workshop,learn Hacking ,ceh
College-University Vocational-Trade-Schools Root Category Home-Schooling scholarships books certification students

Learn Ethical Hacking,hacking Workshop,learn Hacking ,ceh

We are Ec- Council Authorized training Partner; The International Council of E-Commerce

Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and information security skills. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many others programs, that are offered in over 60 countries through a training network of more than 450 training partners globally.

Ec-council received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). And the United States Department of Defense has included the CEH program into its Directive 8570, making it as one of the mandatory standards to be achieved by Computer Network Defenders Service Providers (CND-SP)

Term & Conditions:

Jodo Institute responsibility: Impart training on workshop and Guide the students for future in Security.


College management/organizer: Requirements for workshop:

Seminar Hall

Two cordless Mikes

2 LCD projectors

Internet Connection

2 Volunteers

Accommodation for two Security Consultants in College.

Workshop Duration:

16 hours (2 Days)

Workshop Curriculum:

PART I Ethics

Why is Security needed?

What is ethical hacking?

Ethical Hacker vs Malicious Hacker

Types of Hackers

Building an approach for ethical hacking

PART II Google Hacking

What is Google?

How does Google work?

Google Tricks

Basic Hacks

Google Calculator

GoogleNews

Google Tools

How can Google hacking help an ethical hacker?

.Preventing Google Crawls

Practical Class: Case Studies

PART III Scanning

What is Scanning?

Objectives of Scanning

Practical Class

Scanning Tools to be used:

Nmap

Null Scan

Firewalk

XMAS Scan

NIKTO

GFI Languard

PART IV Email Hacking

How does Email work?

Tracing an Email

Spam

What is Spamming?

Methods of Prevention

Laws about Spamming

Fake Emails

Detecting Fake Emails

Tracing Server variables through

Part V Trojans

Definition

Legend

Difference b/w Trojan, virus and worms

Working of Trojans

Server, Client, Direct & Reverse connections

Trojan Practical

Beast, Bandook etc.

Both direct and reverse connection

Trojans on WAN

Problems Dynamic IP

NAT

Using netcat as a Trojan

Antivirus Detection process

Heuristics, signatures

Hex editing, source code changes, custom, binders, packers, DLL injection

Social Engineering Deploying Trojans

Manual Detection

TCP-view, process monitors

Part VI Session Hijacking

Understanding Sessions

Passive vs. Active session hijack

TCP sessions and HTTP sessions

TCP session hijacking Telnet

Stealing Cookies to Hijack Session ID -XSS

Part VII PHP Injection

Understanding Sever side scripting

Using code-injection to escalate privileges

Briefings on PHP, ASP etc.

Coding PHP shell

Using PHP shells

Exploiting file upload vulnerability

PHP vulnerable functions and safe mode

Prevention of code injection

Part VIII SQL Injection

Defining SQL

Understanding web application

Using SQL to login via middleware language

Checking SQL Injection vulnerability

URL and forms

SQL query SELECT, DROP etc.

SQL cheat sheets

Using source changes to bypass client side validation

PHP magic quotes

Using SQL injection tools

Importance of Server side validation

Part IX Sniffing

Introduction

Active, Passive

DNS, ARP

Tools

Wireshark, Ettercap Cain n Abel

Detecting Sniffing

DNS Poisoning

Router Hacking

Emulating WAN sniffing

Part X Bluetooth Hacking

Bluetooth Introduction

Security Issues

Security Attacks

Bluejacking

Tools for Bluejacking

Tools for Bluejacking

BlueSpam

Blue snarfing

BlueBug Attack

Short Pairing Code Attacks

Man-In-Middle Attacks

OnLine PIN Cracking Attack

BTKeylogging attack

BTVoiceBugging attack

Blueprinting

Bluesmacking -The Ping of Death

Denial-of-Service Attack

BlueDump Attack

Part XICryptography

Introduction to Cryptography

ClassicalCryptographic Techniques -Encryption/Decryption

Cryptographic Algorithms

RSA (Rivest Shamir Adleman)

Example of RSA Algorithm

-RSA Attacks

-RSA Challenge

Data Encryption Standard (DES)

DES Overview

RC4, RC5, RC6, Blowfish

One-way Bash Functions -MD5

SHA (Secure Hash Algorithm)

SSL (Secure Sockets Layer)

What is SSH?

SSH (Secure Shell)

Algorithms and Security

Disk Encryption

Government Access to Keys (GAK)

Code Breaking: Methodologies

Cryptanalysis

Cryptography Attacks

vBrute-Force Attack

Cracking S/MIME Encryption Using Idle CPU Time

Use Of Cryptography

Part XIISocial Networking Sites & Hacking

Impersonating Orkut, Facebook, MySpace

Orkut

Impersonating on Orkut

MW.Orc worm

Facebook

Impersonating onFacebook

MySpace

Impersonating on MySpace

How to Steal Identity

Comparison

Original

Identity Theft

http://www.consumer.gov/idtheft/

Part XIII: Malicious Hacking

Yahoo booters

Crawlers

Remote File Inclusion

Local File Inclusion


Backdoor Shells

Trojan Writing in C, C++

PHP Injection

by: Mohit Yadav --JODO INSTITUTE ---9891773445
Functional Essays Regarding Recommendations On How To Learn About Low Budget Plane Ticket Rates Easy Scholarships For college - get a free scholarship for college Driving Theory Test: Learn The Highway Code Rules What Ails Indias Graduates Are You Ready To Learn The Truth About Rank Builder HPC hydraulic cone crusher practice case studies and applications Communication Program at its high at Centennial College Basic things about the ISEE exam The Must Study Exclusive Jamorama Review Advantageous Commentaries Regarding Suggestions On How To Learn About Bargain Ticket Rates 000-M01 exam dumps IBM 000-M07 exam 000-139 exam preparation
print
www.yloan.com guest:  register | login | search IP(216.73.216.16) California / Anaheim Processed in 0.019391 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 348 , 6626, 249,
Learn Ethical Hacking,hacking Workshop,learn Hacking ,ceh Anaheim