Category: IT Certification | IT Security and Ethical Hacking
Medium of instruction: | English |
Accord infor Matrix offers best CEH training in chennai. We offer internship in real -life business application of our clients. Students are given practical training in the below mentioned syllabus. The syallbus can be customized according to individual needs.
Hacking
-
Explaining the certicication
-
Introducing security
-
Introducing Hacking
-
Introduction to Ethical Hacking
Lesson 2: Foot Printing
-
Defining Foot Printing
-
Information Gathering Methodology
-
Locate the Network Range
-
Hacking Tools
Lesson 3: Scanning
-
Definition of scanning
-
Types of scanning
-
Objectives of Scanning
-
Scanning Methodology
-
Classification of Scaning
-
Hacking Tools
-
Countermeasures
Lesson 4: Enumeration
-
What is Enumeration?
-
NetBIOS Null Sessions
-
Hacking Tools
-
Enumerating User Accounts
-
Oactive Directoru Enumeration and Countermeasures
Lesson 5: System Hacking
-
Administrator Password Guessing
-
Manual Password Cracking Algorithm
-
Automated Password Cracking
-
Password Types
-
Tupes of Password Atacks
-
Hacking Tools
-
Countermeasures: IP Security
Lesson 6: Trojans and Backdoors
-
Effect on Business
-
What is a Trojan?
-
Overt and Covert Channels
-
Indications of a Trojan Attack
-
Reverse Engineering Tojans
-
Backdoor Countermeasures
Lesson 7: Sniffers
-
Definition of sniffing
-
How a sniffing wors?
-
Passive Sniffing
-
Active Sniffing
-
Hacking Tools
-
Sniffing Countermeasures
Lesson 8: Denial of Service
-
What is Denial of Srvice?
-
Goal of Dos (Denial of Service)
-
Impact and modes of Attack
-
DOS Attack Classification
-
Hacking Tools
-
Countermeasures for Reflected DOS
-
Tools for Detecting DDOS Attacks
Lesson 9: Social Enginnering
-
What is social Engineering
-
Art of Maipulation
-
Human Weakness
-
Common Types of socail Engineering
-
Human Based Impresonation
Lesson 10: Session Hijacking
-
Understanding Session Hijacking
-
Spofing vs Hijacking
-
Steps in Session Hijacking
-
Hacking Tools
-
Proctection agains session Hijacking
-
Sniffing Tools
-
Securing Wireless Newtorks
Lesson 11: Hacking Web Servers
-
Popular Web Servers and common security Threats
-
Apache Vulnerability
-
Attack against IIS console
-
Hacking Tools
-
Countermeasures
-
Increasing Web Server Security
Lesson 12: Web Application Vulnerability
-
Web Apploication Hacking
-
Anatomy of an attack
-
Web Appliocation Threats
-
Carnivore
-
Google Hacking
-
Countermeasures
Lesson 13: Web Based Password Cracking Techniques
-
Authentication – Definition
-
Authentication Mechanisms
-
Passwors Guessing
-
Query String
-
Cookies
-
Password Crackers Available
-
Hacking Tools
-
Countermeasures
SQL Injection
-
Attacking SQL Servers
-
SQL Server Resolution Service(SSRS)
-
Osql – L Probing
-
Port Scanning
-
SQL Server Tallks
-
Preventive Measures
Lesson 15: Hacking Wireless Networks
-
Wireless Basics
-
Commponents of Wireless Network
-
Access Point Positioning
-
Rogue Access Points
-
Tools to Generate Rough Access Points
-
Scanning Tools
-
Digital Cerificate
-
RSA (Rivest Shamir Adleman)
-
RSA Attacks
Lesson 16: Worms and Viruses
-
Virus Characteristics
-
Symptoms of 'Virus-like' Attack
-
Indications of a Virus Attack
-
Virus / Worms found in the wild
-
Virus Checkers
-
Virus Analyzers
Lesson 17: Physical Security
-
Understaning Physical Security
-
Factots Affecting Physical Security
-
Wiretapping
-
Lock Picking Techniques
-
Spying Technologies
Lesson18: Linus Hacking
-
Linus Basics
-
Linus Vulnerabilities
-
Scanning Newtorks
-
Scanning Tools
-
Linux Security Tools
-
Advanced Intrusion Detection System
-
Linux Security Auditing Tool
-
Linux Security Countermeasures
Lesson 19: Evading Firewalls. IDS and Honeypots
-
Intrusion Detection Systems
-
Ways to Detect Intrusion
-
Mapping IP Addresses to Milticast MAC Addresses
-
Types of Intrusion Detection System
-
Intrusion Detectin Tools
-
Honeypot Project
-
Tools to Detect Honeypot
Lesson 21: Cryptography
-
Public-Key Cryptography
-
Working of Encryption
-
Digital Signature
Lesson 22: Penetration Testing
-
Penetration Test vs. Vulnerability Test
-
Reliance on Checklists and Templates
-
Shell codePhases of Penetration Testing
-
Risk analysis
-
Types of Penetration Testing
-
Types of Ethical Hacking
-
SANS Institute Top 20 Security Vulnerabilities
-
Penetration Testing Deliverable Templates
-
Active reconnaissance
Classroom - Regular | ||||
When | Duration | Where | Remarks | Price |
Not Specified |
1 Months |
All Venues | Not Specified | Price On Request |
Online | ||||
When | Duration | Where | Remarks | Price |
Not Specified | Not Specified | Study Online (on your computer) | Not Specified | Price On Request |
Accord infoMatrix
Accord Info Matrix is a Chennai based Software Firm. Our main focus areas are Software Training and Software Development. Accord started with the ambitious aim of providing QUALITY training to Students and Corporate. We are integrated as an organization of talented trainers having extensive expertise in all facets of providing quality training.