| Course Others | You are Offering Professional Course | Locality Race Course |
ADA LOVELACE TECHNOLOGIES Ltd
M/s.Ada Lovelace Technologies Limited (ALT) having headquartered in Chennai, India has diversified business in the areas of IT & ITES, Embedded Engineering, Education and Research. Both Training and Development skill are imparted in specific technical areas.
Information Security Overview
o Internet Crime Current Report: IC3
o Data Breach Investigations Report
o Essential Terminology
o Elements of Information Security
o The Security, Functionality, and Usability Triangle
Information Security Threats and Attack Vectors
o Top Information Security Attack Vectors
o Motives, Goals, and Objectives of Information Security Attacks
o Information Security Threats
o Information Warfare
o IPv6 Security Threats
Hacking Concepts
o Hacking vs. Ethical Hacking
o Effects of Hacking on Business
o Who Is a Hacker?
o Hacker Classes
o Hacktivism
Hacking Phases
Types of Attacks
o Types of Attacks on a System
o Operating System Attacks
o Misconfiguration Attacks
o Application-Level Attacks
o Examples of Application-Level Attacks
o Shrink Wrap Code Attacks
Information Security Controls
o Why Ethical Hacking is Necessary
o Scope and Limitations of Ethical Hacking
o Skills of an Ethical Hacker
o Defense in Depth
o Incident Management Process
o Information Security Policies
o Classification of Security Policies
o Structure and Contents of Security Policies
o Types of Security Policies
o Steps to Create and Implement Security Policies
o Examples of Security Policies
o Vulnerability Research
o Vulnerability Research Websites
o What Is Penetration Testing?
o Why Penetration Testing
o Penetration Testing Methodology
Footprinting and Reconnaissance
Footprinting Concepts
o Footprinting Terminology
o What is Footprinting?
o Why Footprinting?
o Objectives of Footprinting
Finding Resources Using Google Advance Operator
• Google Hacking Tool: Google Hacking Database (GHDB)
• Google Hacking Tools
o WHOIS Footprinting
• WHOIS Lookup
• WHOIS Lookup Result Analysis
• WHOIS Lookup Tool: SmartWhois
• WHOIS Lookup Tools
• WHOIS Lookup Online Tools
o DNS Footprinting
• Extracting DNS Information
• DNS Interrogation Tools
o Network Footprinting
• Locate the Network Range
• Determine the Operating System
• Traceroute
• Traceroute Analysis
• Traceroute Tools
o Footprinting through Social Engineering
• Footprinting through Social Engineering
• Collect Information Using Eavesdropping, Shoulder Surfing, and Dumpster Diving
o Footprinting through
• Collect Information through Social Engineering on Social Networking Sites
• Information Available on Social Networking Sites
• Collecting Facebook Information
• Collecting Twitter Information
• Collecting Linkedin Information
• Collecting Youtube Information
• Tracking Users on Social Networking Sites
Footprinting Tools
o Footprinting Tool: Maltego
o Footprinting Tool: Domain Name Analyzer Pro
o Footprinting Tool: Web Data Extractor
o Additional Footprinting Tools
Footprinting Countermeasures
Footprinting Penetration Testing
o Footprinting Pen Testing
o Footprinting Pen Testing Report Templates
Scanning Networks
Overview of Network Scanning
CEH Scanning Methodology
o Check for Live Systems
• Checking for Live Systems - ICMP Scanning
• Ping Sweep
• Ping Sweep Tools
o Check for Open Ports
• Three-Way Handshake
• TCP Communication Flags
• Create Custom Packet Using TCP Flags
• Create Custom Packet Using TCP Flags
• Scanning IPv6 Network
• Scanning Tool: Nmap
• Hping2 / Hping3
• Hping Commands
• Scanning Techniques
• TCP Connect / Full Open Scan
• Stealth Scan (Half-open Scan)
• Stealth Scan (Half-open Scan)
• Xmas Scan
• FIN Scan
Contact Details:
M/s.Ada LoveLace Technologies Ltd,
#1607 Beena House, Near Airindia,
Trichy Road, Coimbatore-641018
Contact No. 8220049119,
Email:[email protected]
http://www.adalovelacetechnolog
ies.com/