Ethical Hacking Online Training
Ethical Hacking Online Training Course Content:
Intrusion Techniques
Introduction to Ethical Hacking
•What is Hacking and Ethical Hacking
• Types of Hacking
• Types of Hackers
• Causes and reasons
• Phases of Hacking
Information gathering
• Foot printing - Active / Passive
• Scanning
• Sniffers
Creating a successful hack
• Exploits
• Password Hacking/cracking (offline/online)
Hacking by stealth
• Virus
• Trojans
• Binders
• Key loggers
Most popular hacker attacks
• Dos-attack (Types of DoS Attack)
• Buffer Over Flow
• Google Hacking
• Anonymous Proxy
• SQL Injection
Social Engineering
• Social engineering basics
• Phishing
Linux Hacking
Wireless Hacking
Physical Security
Techniques for Covering Tracks
Introduction to firewalls
• Types of firewalls
• Advantages of a stateful firewall
• Discussion on stateful inspection
• Placement of firewall in a network
NETASQ
• Installation modes
• Initial configuration
• NAT & Filtering
• Time based access
• Routing
• Static
• Policy based
• Interface-based
• Load balancing / Failover of ISP
• Default route
• Content Analysis
• Authentications & Internal LDAP
• Integrating Active directory for authentication
• Qos
• Ipsec VPN & SSL VPN
• IPS
• Contextual Signatures
• Vulnerability Manager
•Real-time monitor & Event manager
•Reporting
•Backup & Restore of configuration
CCNA Security CISCO (PIX/ ASA) Firewalls
Common Security Threats
Describe common security threats
Security and Cisco Routers
•Implement security on Cisco routers
•Describe securing the control, data, and management plane
•Describe Cisco Security Manager
•Describe IPv4 to IPv6 transition
AAA on Cisco Devices
•Implement AAA (authentication, authorization, and accounting)
•Describe TACACS+
•Describe RADIUS
•Describe AAA
•Verify AAA Functionality
IOC ACLs
•Describe standard, extended, and named ACL to filter packets
•Describe considerations when building ACLs
•Implement IP ACLs to mitigate threats in a network
Secure Network Management and Reporting
•Describe secure network management
•Implement secure network management
Common Layer 2 Attacks
•Describe Layer 2 security using Cisco switches
• Describe VLAN security
•Implement VLANs and trunking
•Implement spanning tree
Cisco Firewall Technologies
•Operational strengths and weaknesses of firewall technologies
•Describe stateful firewalls
•Describe the types of NAT used in firewall technologies
•Implement zone-based policy firewall using CCP
•Implement the Cisco Adaptive Security Appliance (ASA)
• Implement Network Address Translation (NAT)
• Implement Port Address Translation (PAT)
Cisco IPS
• Cisco Intrusion Prevention System (IPS) deployment
• Describe IPS technologies
•Configure Cisco IOS IPS using CCP
VPN Technologies
• Describe the different methods used in cryptography
•Describe VPN technologies
•Describe the building blocks of IPSec
•IPSec site-to-site VPN with pre-shared key authentication
•Verify VPN operations
•Secure Sockets Layer (SSL) VPN using ASA device manager
Advanced Topics
• Time-based ACL
•Object-grouping
•Content analysis
•URL filtering
•Authentication
-Internal
-External
•Logging and reports
•ASA to ASA VPN
•Client-access VPN
•Failover
•Backup, upgrade and restore of firewall
•Configuration Backup
•Password recovery