About this Course
“Know thy enemy”. The ISS CAMPUS’ Ethical Hacking Course teaches you how to be a white hat hacker, by teaching you the techniques used by hackers to comprise websites, networks and systems. By learning how they do it, you can secure your infrastructure to withstand such attacks. Via practical workshops, learn the techniques used by black hat hackers including MAC address spoofing, denial of service attacks, social engineering, SQL injection, cross-site scripting and more. Learn the tricks of the trade and make sure you keep abreast with the latest hacking techniques.
This course is ideal for:
• I.T Graduates who wish to embark on the first step to a career in information security.
Course Outline
Introduction to Ethical Hacking
•Differences between Whitehat and Blackhat hackers.
•Laws and the professional ethics concerned with hacking.
Networking Foundations
•Public vs private IP addressing.
•Understanding subnetting.
•Understanding ports and well-know application/protocol ports.
Footprinting and Reconnaissance
•Active information gathering.
•Passive information gathering.
•Google search and social media.
•Network scans.
•Vulnerability scans.
•Ping sweeps.
•Social engineering.
Scanning
•Different types of scans.
•Using nmap to perform a network scan.
•The 3-way handshake.
•TCP session handling.
Passwords (Windows & Linux)
•Identify different types of password attacks.
•Cracking techniques.
•Understanding the Windows authentication mechanism.
•Password sniffing.
•Password cracking tools on Linux.
Sniffing
•Understanding sniffing.
•Understanding ARP.
•Active and passive sniffing.
•Using Wireshark to sniff a network and filter information.
Social Engineering
•Defining social engineering.
•Social engineering methods.
•Reverse social engineering using social media.
Cryptography
•Cryptographic methods.
•Cryptographic algorithms including AES, RC4, RSA and MD5.
•Symmetric and Asymmetric key encryption/decryption.
Hacking Wireless Systems
•Identify wireless network types.
•Identify wireless network encryption types (WEP & WPA/WPA2).
•Wireless hacking methodology.
•Defending your wireless network from attacks.