Certified Ethical Hacking Engineer
Duration | 86 hours
THINKWorks is an idea derived with a vision to make quality Tech skill-oriented education available and affordable to every job aspiring youth of the nation. This created a need to get all stakeholders of education such as Students, Colleges, Institutes, communities, and Industry together. Leaners undergo this comprehensive program to develop Skills on Employability, Interview and Aptitude.
Prerequisites
Computer Skills | Linux Skills | Programming Skills | Basic Hardware Knowledge | Reverse Engineering | Cryptography Skills | Database Skill
Course Objectives
The purpose of ethical hacking is to evaluate the security of and identify vulnerabilities in target systems, networks or system infrastructure. The process entails finding and then attempting to exploit vulnerabilities to determine whether unauthorized access or other malicious activities are possible.
Things you will learn
We help our students at every stage, from the start of a course to the actual skill-building technique. Our curriculum covers the following.
Cyber Security, Ethical Hacking, and Penetration Testing
- Introduction
- Structure
- Objectives
- The Ten Thousand Feet View
- Cyber Security
- Free comic strip subscription service
- Electronic health record service
- Ethical Hacking
- Phases of a Hack
- Penetration testing
- Conclusion
Prerequisites and Syllabus
- Introduction
- Structure
- Objectives
- Certified Ethical Hacker
- Version 10 & 11
- Prerequisites
- Modes of study and examination
- Option 1: ECC Exam voucher
- Option 2: VUE Exam voucher
Aptitude
- Introduction
- Structure
- Objectives
- Information Security and Penetration Testing
- EC-Council CEH
Reconnaissance
- Introduction
- Structure
- Objectives
- Understanding Reconnaissance
- Financial Information
- Technology Stack
- Workforce and Clientele
- Operating Environment
- Network Configurations
- Web content
- Conclusion
- Test Your Understanding
Social Engineering
- Introduction
- Structure
- Objectives
- Social Engineering: The Bookie Story
- Social Engineering Methodology
- Social Engineering Techniques
- Tools of Social Engineering
- Social Engineering Countermeasures
- Conclusion
- Test Your Understanding
Scanning Networks
- Introduction
- Structure
- Objectives
- Anatomy of a Computer Network
- Live Host Discovery
- Port Scan and Service Discovery
- TCP Scan
- UDP Scan
- Banner Grabbing
- Network Mapping
- Conclusion
- Test Your Understanding
Enumeration
- Introduction
- Structure
- Objectives
- Enumeration as a successor to network scan
- NetBIOS enumeration
- SNMP Enumeration
- LDAP enumeration
- NTP enumeration
- NTP enumeration commands
- SMTP enumeration
- DNS enumeration
- Conclusion
- Test Your Understanding
Vulnerability Assessment
- Introduction
- Structure
- Objectives
- Process Overview
- Residual Risk
- DevSecOps
- Conclusion
- Test Your Understanding
System Hacking
- Introduction
- Structure
- Objectives
- System hacking stages
- Password cracking
- Password storage in modern systems
- Security Account Manager (SAM)
- NTLM Authentication
- Kerberos authentication
- Rainbow tables
- Backdoor Entry – Trojans
- Password cracking defense checklist
- Privilege escalation
- Horizontal privilege escalation
- Vertical privilege escalation
- DLL hijacking
- Executing application
- Remote execution tools
- Hiding files and covering tracks
- Conclusion
- Test Your Understanding
Session Hijacking
- Introduction
- Structure
- Objectives
- TCP and Web sessions
- Network-level session hijacking
- TCP session hijacking
- UDP hijacking
- Application-level session hijacking
- Countermeasures to session hijacking
- Conclusion
- Test Your Understanding
Web Server Hacking
- Introduction
- Structure
- Objectives
- Web server
- Tools for web server hacking
- Conclusion
- Test Your Understanding
Web Application Hacking
- Introduction
- Structure
- Objectives
- Tools used in web application hacking
Conclusion - Test Your Understanding
Hacking Wireless Networks
- Introduction
- Structure
- Objectives
- The wireless connectivity
- Wireless standards
- 802.11a
- 802.11b
- 802.11g
- IEEE 802.11ac (Wi-Fi)
- 802.16 (WiMAX)
- Bluetooth
- Wired Equivalent Privacy (WEP)
- Wi-Fi Protected Access (WPA)
- WPA2
- WPA3
- Wireless Hacking Methodology
- Wireless network discovery
- Wireless network mapping
- Wireless network analysis
- Wireless network attacks
- Deauthentication attack
- WPA Handshake Capture
- Man-in-the-Middle Attack (MITM)
- Wireless Honeypots
- Conclusion
- Test Your Understanding
Hacking Mobile Platforms
- Introduction
- Structure
- Objectives
- Mobile platform landscape
- Attack vectors in mobile platforms
- Android OS architecture
- iOS architecture
- Jailbreaking/Rooting mobile devices
- Mobile application repackaging
- Mobile device management227
- Mobile spyware and privacy concerns
- Security guidelines for mobile devices and platforms
- Test Your Understanding
Hacking Cloud, IoT, and OT Platforms
- Introduction
- Structure
- Objectives
- Cloud Computing
- Cloud Infrastructure
- Cloud Deployment Models
- Virtualization
- Containers
- NIST Cloud Computing Reference
- Architecture
- Cloud computing threats
- Cloud attack vectors
- Internet of Things (IoT)
- IoT Architecture
- IoT communication models
- Threats to IoT Networks
- IoT attack vectors
- Operational Technologies (OT) and
- Industrial Internet of Things (IIoT)
- OT and IIoT attack vectors
- Cloud, IoT, and OT hacking tools
- Conclusion
- Test Your Understanding
Cryptography
- Introduction
- Structure
- Objectives
- Cryptographic primitives
- Cryptanalysis tools
Evading Security Measures
- Introduction
- Structure
- Objectives
- Security of an information system
- Threat Modelling
- Intrusion Detection System (IDS)
- Intrusion Prevention System (IPS)
- Evading security measures
- Detection by Association
- Conclusion
- Test Your Understanding
Practical Exercises on Penetration Testing and Malware Attacks
- Structure
- Objectives
- Exercises
- Solutions
Roadmap for a Security Professional
- Introduction
- Structure
- Objectives
- Cybersecurity Landscape
- Network Security
- Cyber Forensics
- Penetration Testing
- Cyber Auditing
- Software Professional
Digital Compliances and Cyber Laws
- Introduction
- Structure
- Objectives
- Need for Compliances and Cyber Laws
- The privacy debate
- Activity