Unit I Introduction to Ethical Hacking: Hacking Evolution, What Is an Ethical Hacker?, Ethical hacking and Penetration testing, Hacking methodologies System Fundamentals: Fundamental of computer networks, Exploring TCP/IP ports, Understanding network devices, Proxies, Firewall and Network Security, Knowing Operating Systems (Windows, Mac, Android and Linux) Cryptography: History of cryptography, Symmetric cryptography, Asymmetric cryptography, Understanding Hashing, Issues with cryptography, Application of cryptography (IPsec, PGP, SSl) Unit II Footprinting: What is Footprinting, Threats Introduced by Footprinting, The Footprinting process, Using (Search engine, Google hacking, Social networking and Financial services) Information gathering Scanning: What is Scanning, Types of Scans, Family tree of Scans, OS fingerprinting, Countermeasure, Vulnerability Scanning and Using Proxies Unit III Enumeration: What is Enumeration, Windows Enumeration, Enumeration with SNMP, LDAP and Dir
Comments
Post a Comment