Professional Documents
Culture Documents
AIM Scanning
This course will show you how to scan, test, • War Dialers
hack and secure your own systems. The • TCP Three Way Handshake
intensive lab demonstrations gives each • Demo - SuperScan
student in-depth knowledge and practical • Port Scanning Techniques
experience with the current security systems. • Port Scanning Tools
You will begin by understanding how • Scanning Tools
• Demo - Cheops & nMap
perimeter defences work and then be lead into
scanning and attacking your own networks. Enumeration
You will then learn how intruders escalate
privileges and what steps can be taken to • Enumeration
secure a system. Students will also learn about • Net Bios Null Sessions
Intrusion Detection, Policy Creation, Social • Demo - Creating a Null User Session
Engineering, DDoS Attacks, Buffer Overflows • Countermeasure to Null Sessions
and Virus Creation • Hacking Tools
• Demo - Using SolarWinds
• How to Identify Accounts
Who Should Attend: • More Hacking Tools
• Demo - Cain Enable
Network Administrators, LAN professionals,
System Hacking
Application developers, programmers, project
leaders and other technical individuals that
• Password Guessing
need to acquire the necessary skills to thwart • Hacking Tool - KerbCrack
hacker assaults on corporate networks. • Demo - LoftCrack
• Privilege Escalation
Introduction to Ethical Hacking • Password Cracking
• Demo - Metasploit Project
• Can Hacking be Ethical • SMBRelay
• What does a Malicious Hacker Do? • Man-In-The-Middle Scenario
• Classification of Hackers • More Hacking Tools
• What do Ethical Hackers Do? • Countermeasures to Installing a Rootkit
• Modes of Ethical Hacking • Demo - Using an Alternate Data Stream
• Demo - BlindSide • Demo - BlindSide
Cryptography
• Cryptography Overview
• Different Types of Cryptography
• RC5 & Rainbow Tables
• Demo - How to Create Rainbow Table
• Ethical Hacker Course Closure
Physical Security
• Physical Security
• Understanding Physical Security
• What is the need of Physical Security?
• Company Surroundings & Premises
• Reception
• Wireless Access Points
• Security of Other Equipment
• Wiretapping, Remote Access & Spying
Penetration Testing
• Penetration Testing
• Penetration Testing Methodology
• Open Source vs Proprietary Methodologies
• Starting Point and Ending Points of
Testing
• Selecting the Right Tools
• Penetration Testing Tools
• Gathering Network Information
• Different Types of Threats
• More Tools
• Demo - Nessus Security Analyzer
• Reports and Logs
• Ethical Hacker Course Closure