You are on page 1of 3

Minggu ke1.

Pokok
Bahasan
Introduction to Ethical Hacking

2.

Review to Internet Protocol

3.

Review to Linux & Windows Operating


System

4.

Footprinting & Reconnaissance 1

Sub Pokok Bahasan

Information Security Overview

Information Security Threats and Attack Vectors

Hacking Concepts

Hacking Phases

Types of Attacks

Information Security Controls

What are TCP/IP and the Internet?


The Network Interface Layer
The Internet Layer
The Transport Layer Protocols
The TCP/IP Application Layer
TCP and UDP Applications
Protocol Analysis

What is Linux?

Understanding files & folders

Users & permissions

Shell & Terminal

Basic commands

Understanding Linux configuration files

Windows OS History

Windows Registry

Network Properties

Remote connections

Task & Process manager

File & Folders


Footprinting Concepts
Footprinting Threats
Footprinting Methodology

5.

Footprinting & Reconnaissance 2

Footprinting through Search Engines

Website Footprinting

Email Footprinting

Competitive Intelligence

Footprinting Methodology
o

Footprinting using Google

WHOIS Footprinting

DNS Footprinting

Network Footprinting

Footprinting through Social Engineering

Footprinting through Social Networking Sites

Footprinting Tools
Footprinting Countermeasures
Footprinting Penetration Testing

Pokok
Bahasan

Minggu ke6.

Scanning

Sub Pokok Bahasan


Overview of Network Scanning
Scanning Methodology

7.

Enumeration

Check for Live Systems

Check for Open Ports

Scanning Beyond IDS

Banner Grabbing

Scan for Vulnerability

Draw Network Diagrams

Prepare Proxies

Scanning Pen Testing

Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
UNIX/Linux Enumeration
LDAP Enumeration
NTP Enumeration
SMTP Enumeration
DNS Enumeration
Enumeration Countermeasures
SMB Enumeration Countermeasures

8.

UTS

Enumeration Pen Testing


Ujian Tengah Semester

9.

System Hacking 1

Information at Hand Before System Hacking Stage


System Hacking: Goals
CEH Hacking Methodology (CHM)
CEH System Hacking Steps

10.

System Hacking 2

CrackingPasswords

Password Cracking

Escalating Privileges

CEH System Hacking Steps


o

Keylogger

Spyware

How to Defend Against Keyloggers

Hiding Files

Rootkits

NTFS Data Stream

What Is Steganography?

Covering Tracks

Penetration Testing

Pokok
Bahasan

Minggu ke11.

Trojan & Backdoors

Sub Pokok Bahasan


Trojan Concepts
Trojan Infection
Types of Trojans
Trojan Detection
Countermeasures
Anti-Trojan Software
Pen Testing for Trojans and Backdoors

12.

Viruses & Worms

Virus and Worms Concepts


Types of Viruses
Computer Worms
Malware Analysis
Counter-measures
Penetration Testing for Virus

13.

14.

15.

16.

Sniffers

Social Engineering

Denial of Services

UAS

Sniffing Concepts

MAC Attacks

DHCP Attacks

ARP Poisoning

Spoofing Attack

DNS Poisoning

Sniffing Tools

Counter measures

Sniffing Pen Testing

Social Engineering Concepts

Social Engineering Techniques

Imperso-nation on Social Networking Sites

Identity Theft

Social Engineering Countermeasures

Social Engineering Pen Testing

DoS/DDoS Concepts

DoS Atack Techniques

Botnet

DDoS Case Study

DoS Attack Tools

Counter-measures

DoS/DDoS Protection Tools

DoS Attack Penetration Testing


Ujian Akhir Semester

You might also like