You are on page 1of 7

NETWORKING, SECURITY & ETHICAL HACKING COURSE

STRUCTURE

Basic Network Concepts 2 Hrs


 Identifying Characteristics of a  Network Media and Connectors
Network  Coaxial Cable
 Servers, Workstations, and Hosts  Twisted-Pair Cable
 WANs, LANs, and MANs  Fiber-Optic Cable
 Types of Networks  Connector Types
 Internet, Intranet, and Extranet  Access Methods
 Identifying Network Topologies  CSMA/CD
 Bus Topologies  CSMA/CA
 Star Topologies  Token Passing
 Mesh Topologies  Network Architectures
 Ring Topologies  Broadband and Baseband
 Hybrid Topologies  Ethernet
 Wireless Topologies  Token Ring
 Point-to-Point and Point-  FDDI
to- Multipoint  Network Operating Systems
 Segments and Backbones  Windows Servers

Network Protocols & Standards 3 Hrs


 Network Protocols  Layer 5: The Session Layer
 NetBEUI  Layer 4: The Transport Layer
 What Is NetBIOS?  Layer 3: The Network Layer
 IPX/SPX  Layer 2: The Data Link Layer
 AppleTalk  Layer 1: The Physical Layer
 TCP/IP  Protocols and the OSI Layers
 Routable vs. Non-routable  Viewing Protocol
Protocols Information with Network
 The OSI Model Monitor
 Layer 7: The Application Layer  802 Project Standards
 Layer 6: The Presentation Layer  IEEE 802 Categories

BA-86, Sector 1, Saltlake, Kolkata-700064, Ph.- +919007018662


email: tirtha@cronyinfotech.com ,www.cronyinfotech.com
Networking Components 2 Hrs

 Network Interface Cards  Switches


 Transceivers  Routers and Brouters
 MAC Address  Gateways and Security Devices
 Determining Your Local  Gateways
Machine’s MAC Address  Firewalls
 Hubs and Repeaters  Intrusion Detection Systems
 Multistation Access Units  Other Networking Devices
 Repeaters  Wireless Access Points
 Bridges and Switches  Modems
 Bridges  ISDN

TCP/IP Fundamentals 2 Hrs

 TCP/IP Protocol Suite  Viewing TCP/IP Port Values


 The TCP/IP Model  TCP/IP Configuration Concepts
 Application-Layer Protocols  Manual Configuration
 TCP/IP Fundamentals  Dynamic Host Configuration
 TCP/IP Settings Protocol (DHCP)
 TCP/IP Addressing  Boot Protocol
 Understanding Binary  Domain Name System
 Address Classes  Windows Internet Naming
 Loopback Address Service
 Private Addresses  DHCP
 Addressing Schemes  DNS
 IPv6  WINS
 TCP/IP Ports  NAT/PAT

TCP/IP Utilities 4 Hrs

 ARP  Telnet
 How ARP Works  How Telnet Works
 ARP Cache  Using Telnet
 Using ARP to See Your Local  NBTSTAT
ARP Cache  How NetBIOS over TCP/IP
 RARP Works
 Using NBTSTAT  Configuring FTP
 Using NBTSTAT to View  Ping and Hping2
NetBIOS  How Ping Works
 Name Tables  Ping Options
 Tracert  Troubleshooting with Ping
 Using Tracert  Hping2
 Netstat  NSLOOKUP and DIG
 How Netstat Works  How NSLOOKUP Works
 Netstat Options  NSLOOKUP Options
 Troubleshooting with Netstat  DIG
 IPCONFIG and WINIPCFG  Other TCP/IP Utilities
 IPCONFIG  Hostname and Host
 WINIPCFG  MTR
 IFCONFIG  Route
 FTP  Troubleshooting with
 How FTP Works TCP/IP Utilities

Introduction to Ethical Hacking 2 Hrs


 Terminology  Skills Needed by an Ethical
 Hackers, Crackers, and Other Hacker
Related Terms  Types of Information System
 Threats Security Testing
 Hacking History  Ethical Hacking Outputs
 Ethical Hacking Objectives and  Protections and Obligations
Motivations for the Ethical Hacker
 Hacker and Ethical Hacker  Related Types of Computer
Characteristics and Operations Crime

Foot Printing 2 Hrs

 Gathering Information  Determining the Network Range


 Whois with ARIN
 Nslookup  Traceroute and TTL
 Open Source Searching  Email Tracking Programs
 Locating the Network Range

Scanning 2 Hrs
 Identifying Active Machines  Ping Sweeps
 Ping  Ping Tools
 Identifying Open Ports and  Scanning Tools
Available Services  Vulnerable Ports
 Port Scanning  Port Scanning Issues
 TCP/UDP Scanning Types  Banner Grabbing
 Determining the Operating  War Driving and War Walking
System  Fingerprinting
 Passive Fingerprinting
 Mapping the Network
Enumerating 2 Hrs
 Protection Rings  NBTSTAT
 Windows Architecture  Nbtscan
 Windows Security Elements  User2sid and Sid2user
 SAM Database  Other Tools
 Local Security Authority  SNMP Enumeration
Subsystem Service  Other SNMP Enumeration Tools
 NetBIOS  DNS Zone Transfer
 Enumerating Techniques for  NetBIOS Null Sessions
Windows  SNMP Enumeration
 NetBIOS Enumerating Countermeasures
 Net View
System Hacking Techniques 2 Hrs

 Password Guessing  Password Cracking


 Automated Password Guessing  Password Cracking Techniques
 Password Sniffing  Dictionary Attack
 L0phtcrack  Brute Force Attack
 Keystroke Loggers  Stealing SAM
 Hardware Key loggers  Cracking Tools
 Software Key loggers  Clearing the Event Log
 Key logging Tools  File Hiding
 Privilege Escalation
Trojans, Backdoors & Sniffers 2 Hrs
 Trojans and Backdoors  Sniffers
 Trojan Types  Sniffing Exploits
 Remote Access Trojans (RATs)  ARP Spoofing
 Trojan Attack Vectors  MAC Flooding
 Wrappers  DNS Spoofing or Poisoning
 Covert Communication  Sniffing Tools
 Covert Storage Channel  Snort
 Covert Timing Channel  Dsniff
 Covert Communication Tools  Ethereal
 Port Redirection  MAC Flooding Tools
 Net Cat  ARP Poisoning Tools
Denial of Service Attacks & Session Hijacking 3 Hrs
 Denial of Service/Distributed  The TCP/IP Protocol Stack
Denial of Service (DoS/DDoS)  Layered Protocol Roles
 DOS Attacks  Sequence Numbers
 DDoS Attacks  Session Hijacking Steps
 Prevention of DoS Attacks  Tools for Session Hijacking
 Prevention of DDoS Attacks  Protecting Against Session
 Session Hijacking Hijacking

Social Engineering & Physical Security 2 Hrs


 Social Engineering  HTML Image Mapping
 Human-Based (Person-to-  Identity Theft
Person) Social  Defending Against Social
Engineering Engineering Attacks
 Computer-Based Social  Physical Security
Engineering  Physical Security
 Example Social Engineering Implementation
Attacks  Company Facility Controls and
 Motivations for Individuals to Issues
Respond to Social Engineers  Company Personnel Controls
 Reverse Social Engineering  Environmental Controls
 Phishing  Heating, Ventilation, and Air
 Hidden Frames Conditioning (HVAC)
 URL Obfuscation
 Fire Safety Controls  Assessment Questions
 Access Controls  Web Server and Database
 Fax Machines Attacks
 Physical Facility Controls

Firewall Intrusion Detection System & Honey Pots 2 Hrs


 Firewalls  Traceroute
 Firewall Types  ACK Tunneling
 Proxy Firewall  HTTP Tunneling
 Packet Level Filtering Firewall  Firewall Backdoors
 Stateful Inspection Firewalls  Firewall Informer
 Hardware and Software Firewalls  Intrusion Detection and
 Firewall Architectures Response
 Packet-Filtering Routers  Host-Based ID Systems
 Dual-Homed Hosts  Network-Based ID systems
 Screened Host  IDS Detection Methods
 Screened-Subnet Firewalls  Statistical Anomaly Detection
 Firewall Identification  Pattern Matching Detection
 Banner Grabbing  Protocol Detection
 Port Scanning  IDS Responses
 Firewall Ports  Using an IDS in a Switched
 Scanning with TCP Environment
 Scanning with UDP  Intrusion Prevention Systems
 Breaching and Bypassing  Honey pots
Firewalls  Honey pot Applications

Viruses, Worms & Buffer Overflows 2 Hrs


 Viruses  Bogus Spyware Removal
 The Virus Lifecycle Programs
 Macro Viruses  Multistage and Blended Threats
 Polymorphic Viruses  Worms
 Stealth Viruses  Virus and Worm Examples
 Spyware  Explore. Zip
 Web Bugs  LoveLetter
 Spam bots  Melissa Virus
 Pop-Up Downloads  Nimda Virus
 Drive-By Downloads  Pretty Park
 Bugbear  Other Worms of Interest
 Klez  Virus Scanners
 Sir Cam Worm  Virus Prevention
 Code Red Worm  Virus Detection

You might also like