2023 2024 Student Forum > Management Forum > Main Forum

 
  #2  
7th October 2014, 02:08 PM
Super Moderator
 
Join Date: Apr 2013
Re: Ethical Hacking Course Newcastle

Yes, here you are looking for Course Content of Certified Ethical Hacker V7 Newcastle as you want here I am providing you.

Course Content of Certified Ethical Hacker V7 Newcastle

Certified Ethical Hacker v8 Curriculum consists of instructor-led training and self-study. The Instructor will provide the details of self-study modules to the students beginning of the class.

Module 01: Introduction to Ethical Hacking

Information Security Overview
Information Security Threats and Attack Vectors
Hacking Concepts
Hacking Phases
Types of Attacks
Information Security Controls

Module 02: Footprinting and Reconnaissance

Footprinting Concepts
Footprinting Threats
Footprinting Methodology
Website Footprinting
Email Footprinting
Competitive Intelligence
Footprinting using Google
WHOIS Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting through
Footprinting Tools
Footprinting Countermeasures
Footprinting Penetration Testing

Module 03: Scanning Networks

Overview of Network Scanning
CEH Scanning Methodology
Scanning Beyond IDS
Banner Grabbing
Scan for Vulnerability
Draw Network Diagrams
Prepare Proxies
Scanning Pen Testing

Module 04: Enumeration

Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
UNIX/Linux Enumeration
LDAP Enumeration
NTP Enumeration
SMTP Enumeration
DNS Enumeration
Enumeration Countermeasures
SMB Enumeration Countermeasures
Enumeration Pen Testing

Module 05: System Hacking

Information at Hand Before System Hacking Stage
System Hacking: Goals
CEH Hacking Methodology (CHM)
CEH System Hacking Steps

Module 06: Trojans and Backdoors

Trojan Concepts
Trojan Infection
Types of Trojans
Trojan Detection
Countermeasures
Anti-Trojan Software
Pen Testing for Trojans and Backdoors

Module 07: Viruses and Worms

Virus and Worms Concepts
Types of Viruses
Computer Worms
Malware Analysis
Counter-measures
Penetration Testing for Virus

Module 08: Sniffers

Sniffing Concepts
MAC Attacks
DHCP Attacks
ARP Poisoning
Spoofing Attack
DNS Poisoning
Sniffing Tools
Counter measures
Sniffing Pen Testing

Module 09: Social Engineering

Social Engineering Concepts
Social Engineering Techniques
Imperso-nation on Social Networking Sites
Identity Theft
Social Engineering Countermeasures
Social Engineering Pen Testing

Module 10: Denial of Service

DoS/DDoS Concepts
DoS Attack Techniques
Botnet
DDoS Case Study
DoS Attack Tools
Counter-measures
DoS/DDoS Protection Tools
Denial-of-Service (DoS) Attack Penetration Testing

Module 11: Session Hijacking

Session Hijacking Concepts
Network-level Session Hijacking
Session Hijacking Tools
Counter-measures
Session Hijacking Pen Testing

Module 12: Hacking Webservers

Webserver Concepts
Webserver Attacks
Attack Methodology
Counter-measures
Patch Management
Webserver Security Tools
Webserver Pen Testing

Module 13: Hacking Web Applications

Web App Concepts
Web App Threats
Web App Hacking Methodology
Web Application Hacking Tools
Countermeasures
Security Tools
Web App Pen Testing

Module 14: SQL Injection

SQL Injection Concepts
Testing for SQL Injection
Types of SQL Injection
Blind SQL Injection
SQL Injection Methodology
Advanced SQL Injection
SQL Injection Tools
Evasion Techniques
Counter-measures

Module 15: Hacking Wireless Networks

Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Counter-measures
Wireless Security Tools
Wi-Fi Pen Testing

Module 16: Hacking Mobile Platforms

Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Hacking Windows Phone OS
Hacking BlackBerry
Mobile Device Management (MDM)
Mobile Security Guidelines and Tools
Mobile Pen Testing

Module 17: Evading IDS, Firewalls, and Honeypots

IDS, Firewall and Honeypot Concepts
IDS, Firewall and Honeypot System
Evading IDS
Evading Firewalls
Detecting Honeypots
Firewall Evading Tools
Countermeasures
Penetration Testing

Module 18: Buffer Overflow

Buffer Overflow Concepts
Buffer Overflow Methodology
Buffer Overflow Examples
Buffer Overflow Detection
Buffer Overflow Counter-measures
Buffer Overflow Security Tools
Buffer Overflow Penetration Testing

Module 19: Cryptography

Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure(PKI)
Email Encryption
Disk Encryption
Cryptography Attacks
Cryptanalysis Tools

Module 20: Penetration Testing

Pen Testing Concepts
Types of Pen Testing
Pen Testing Techniques
Pen Testing Phases
Pen Testing Roadmap
Outsourcing Pen Testing Services

For more details please let me know we will provide you.
  #3  
22nd March 2015, 05:01 PM
Unregistered
Guest
 
Re: Ethical Hacking Course Newcastle

I want to do Ethical Hacking Course form Total Training Solutions in Newcastle so please give me details including course contents?
  #4  
23rd March 2015, 08:37 AM
Super Moderator
 
Join Date: Apr 2013
Re: Ethical Hacking Course Newcastle

Here I am giving you details about Ethical Hacking Course at Total Training Solutions in Newcastle including course contents.

Total Training Solutions in Newcastle

Price £2,195.00
Duration 5 days

Course Contents:

Module 01: Introduction to Ethical Hacking
Information Security Overview
Information Security Threats and Attack Vectors
Hacking Concepts
Hacking Phases
Types of Attacks
Information Security Controls

Module 02: Footprinting and Reconnaissance
Footprinting Concepts
Footprinting Threats
Footprinting Methodology
Website Footprinting
Email Footprinting
Competitive Intelligence
Footprinting using Google
WHOIS Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting through
Footprinting Tools
Footprinting Countermeasures
Footprinting Penetration Testing

Module 03: Scanning Networks
Overview of Network Scanning
CEH Scanning Methodology
Scanning Beyond IDS
Banner Grabbing
Scan for Vulnerability
Draw Network Diagrams
Prepare Proxies
Scanning Pen Testing

Module 04: Enumeration
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
UNIX/Linux Enumeration
LDAP Enumeration
NTP Enumeration
SMTP Enumeration
DNS Enumeration
Enumeration Countermeasures
SMB Enumeration Countermeasures
Enumeration Pen Testing

Module 05: System Hacking
Information at Hand Before System Hacking Stage
System Hacking: Goals
CEH Hacking Methodology (CHM)
CEH System Hacking Steps

Module 06: Trojans and Backdoors
Trojan Concepts
Trojan Infection
Types of Trojans
Trojan Detection
Countermeasures
Anti-Trojan Software
Pen Testing for Trojans and Backdoors

Module 07: Viruses and Worms
Virus and Worms Concepts
Types of Viruses
Computer Worms
Malware Analysis
Counter-measures
Penetration Testing for Virus

Module 08: Sniffers
Sniffing Concepts
MAC Attacks
DHCP Attacks
ARP Poisoning
Spoofing Attack
DNS Poisoning
Sniffing Tools
Counter measures
Sniffing Pen Testing

Module 09: Social Engineering
Social Engineering Concepts
Social Engineering Techniques
Imperso-nation on Social Networking Sites
Identity Theft
Social Engineering Countermeasures
Social Engineering Pen Testing

Module 10: Denial of Service
DoS/DDoS Concepts
DoS Attack Techniques
Botnet
DDoS Case Study
DoS Attack Tools
Counter-measures
DoS/DDoS Protection Tools
Denial-of-Service (DoS) Attack Penetration Testing

Module 11: Session Hijacking
Session Hijacking Concepts
Network-level Session Hijacking
Session Hijacking Tools
Counter-measures
Session Hijacking Pen Testing

Module 12: Hacking Webservers
Webserver Concepts
Webserver Attacks
Attack Methodology
Counter-measures
Patch Management
Webserver Security Tools
Webserver Pen Testing

Module 13: Hacking Web Applications
Web App Concepts
Web App Threats
Web App Hacking Methodology
Web Application Hacking Tools
Countermeasures
Security Tools
Web App Pen Testing

Module 14: SQL Injection
SQL Injection Concepts
Testing for SQL Injection
Types of SQL Injection
Blind SQL Injection
SQL Injection Methodology
Advanced SQL Injection
SQL Injection Tools
Evasion Techniques
Counter-measures

Module 15: Hacking Wireless Networks
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Counter-measures
Wireless Security Tools
Wi-Fi Pen Testing

Module 16: Hacking Mobile Platforms
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Hacking Windows Phone OS
Hacking BlackBerry
Mobile Device Management (MDM)
Mobile Security Guidelines and Tools
Mobile Pen Testing

Module 17: Evading IDS, Firewalls, and Honeypots
IDS, Firewall and Honeypot Concepts
IDS, Firewall and Honeypot System
Evading IDS
Evading Firewalls
Detecting Honeypots
Firewall Evading Tools
Countermeasures
Penetration Testing

Module 18: Buffer Overflow
Buffer Overflow Concepts
Buffer Overflow Methodology
Buffer Overflow Examples
Buffer Overflow Detection
Buffer Overflow Counter-measures
Buffer Overflow Security Tools
Buffer Overflow Penetration Testing

Module 19: Cryptography
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptography Attacks
Cryptanalysis Tools

Module 20: Penetration Testing
Pen Testing Concepts
Types of Pen Testing
Pen Testing Techniques
Pen Testing Phases
Pen Testing Roadmap
Outsourcing Pen Testing Services


Contact Details:
Total Training Solutions
Omnia One, 125 Queen Street
Sheffield, S1 2DG
Telephone: 0800 612 1299
Email: info@tts-uk.com


Quick Reply
Your Username: Click here to log in

Message:
Options




All times are GMT +5. The time now is 01:21 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3 4