Ethical Hacking Advanced

Information Gathering

Ethical Hacking: is it Ethical – The Hacker mindset – Types of Hacking – The Ethical
Hacking Methodology – Vulnerability Assessment and Penetration Testing – Pen
Testing Execution Standard (PTES) – Information Gathering – Passive Information
Gathering – Active Information Gathering

Enumeration – SMB Enumeration – SMTP Enumeration – SNMP Enumeration – DNS
Enumeration – Email Harvesting – Document Metadata Extraction – Google Hacking

Scanning

1
Port Scanning
2
Types of Port scans
3
Port status
4
Firewall and IDS Evasion
5
Timing Techniques
6
Zenmap
7
Vulnerability Scanning
8
Vulnerability Databases
9
CVE – CVSS – CWE – SCAP – OVAL – Nessus

Exploitation and Post Exploitation

1
Exploitation – Linux exploitation – Gaining Shell
2
Windows Exploitation – Privilege Escalation – Gaining Shell
3
Post Exploitation – Maintaining session – Screen capture
4
Keyloggers – Remote Desktop – Covering Tracks
5
Social Engineering – Browser Exploitation

Exploitation and Post Exploitation

1
Exploitation – Linux exploitation – Gaining Shell
2
Windows Exploitation – Privilege Escalation – Gaining Shell
3
Post Exploitation – Maintaining session – Screen capture – Keyloggers – Remote Desktop – Covering Tracks
4
Social Engineering – Browser Exploitation

Reporting and Advanced topics

1
Reporting – Documentation standards
2
Red teaming: The Esoteric Art of Ethical Hacking

Capture the Flag -Event

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Enrolled: 1 student
Lectures: 20
Level: Advanced

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed