2433183ad01
TRANSCRIPT
-
8/7/2019 2433183Ad01
1/9
BA-86, Sector 1, Saltlake, Kolkata-700064, Ph.-
+919007018662
N E T WORK I N G , S E C U R I T Y & ET H I C AL HACK I NG COU R S E
S T R U C T U R E
Basic Network Concepts 2 Hrs Identifying Characteristics of a
Network
Servers, Workstations, and Hosts
WANs, LANs, and MANs
Types of Networks
Internet, Intranet, and Extranet
Identifying Network Topologies
Bus Topologies
Star Topologies
Mesh Topologies
Ring Topologies
Hybrid Topologies
Wireless Topologies
Point-to-Point and Point-
to- Multipoint
Segments and Backbones
Network Media and Connectors
Coaxial Cable
Twisted-Pair Cable
Fiber-Optic Cable
Connector Types
Access Methods
CSMA/CD
CSMA/CA
Token Passing
Network Architectures
Broadband and Baseband
Ethernet
Token Ring
FDDI
Network Operating Systems
Windows Servers
Network Protocols & Standards 3 Hrs
Network Protocols
NetBEUI
What Is NetBIOS?
IPX/SPX
AppleTalk
TCP/IP
Routable vs. Non-routable
Protocols
The OSI Model
Layer 7: The Application Layer
Layer 6: The Presentation Layer
Layer 5: The Session Layer
Layer 4: The Transport Layer
Layer 3: The Network Layer
Layer 2: The Data Link Layer
Layer 1: The Physical Layer
Protocols and the OSI Layers
Viewing Protocol
Information with Network
Monitor
802 Project Standards
IEEE 802 Categories
mailto:email:%[email protected]://www.zetalabs.org/ -
8/7/2019 2433183Ad01
2/9
Networking Components
Network Interface Cards
Transceivers
MAC Address
Determining Your Local
Machines MAC Address
Hubs and Repeaters
Multistation Access Units
Repeaters
Bridges and Switches
Bridges
Switches
Routers and Brouters
Gateways and Security Devices
Gateways
Firewalls
Intrusion Detection Systems
Other Networking Devices
Wireless Access Points
Modems
ISDN
TCP/IP Fundamentals 2 Hrs
TCP/IP Protocol Suite
The TCP/IP Model
Application-Layer Protocols
TCP/IP Fundamentals
TCP/IP Settings
TCP/IP Addressing
Understanding Binary
Address Classes
Loopback Address
Private Addresses
Addressing Schemes
IPv6
TCP/IP Ports
Viewing TCP/IP Port Values
TCP/IP Configuration Concepts
Manual Configuration
Dynamic Host Configuration
Protocol (DHCP)
Boot Protocol
Domain Name System
Windows Internet Naming
Service
DHCP
DNS
WINS
NAT/PAT
TCP/IP Utilities 4 Hrs
ARP
How ARP Works
ARP Cache
Using ARP to See Your Local
ARP Cache
RARP
-
8/7/2019 2433183Ad01
3/9
Telnet
How Telnet Works
Using Telnet
NBTSTAT
How NetBIOS over TCP/IPWorks
-
8/7/2019 2433183Ad01
4/9
Using NBTSTAT
Using NBTSTAT to View
NetBIOS
Name Tables Tracert
Using Tracert
Netstat
How Netstat Works
Netstat Options
Troubleshooting with Netstat
IPCONFIG and WINIPCFG
IPCONFIG
WINIPCFG IFCONFIG
FTP
How FTP Works
Configuring FTP
Ping and Hping2
How Ping Works
Ping Options Troubleshooting with Ping
Hping2
NSLOOKUP and DIG
How NSLOOKUP Works
NSLOOKUP Options
DIG
Other TCP/IP Utilities
Hostname and Host
MTR Route
Troubleshooting with
TCP/IP Utilities
Introduction to Ethical Hacking 2 Hrs
Terminology
Hackers, Crackers, and Other
Related Terms
Threats
Hacking History
Ethical Hacking Objectives and
Motivations
Hacker and Ethical Hacker
Characteristics and Operations
Skills Needed by an Ethical
Hacker
Types of Information SystemSecurity Testing
Ethical Hacking Outputs
Protections and Obligations
for the Ethical Hacker
Related Types of Computer
Crime
Foot Printing 2 Hrs
Gathering Information
Whois
Nslookup
Open Source Searching
Locating the Network Range
Determining the Network Range
with ARIN
Traceroute and TTL
Email Tracking Programs
Scanning 2 Hrs
-
8/7/2019 2433183Ad01
5/9
Identifying Active Machines
Ping
Ping Sweeps
Ping Tools
Identifying Open Ports andAvailable Services
Port Scanning
TCP/UDP Scanning Types
Determining the Operating
System
Scanning Tools
Vulnerable Ports
Port Scanning Issues
Banner Grabbing
War Driving and War Walking Fingerprinting
Passive Fingerprinting
Mapping the Network
Enumerating 2 Hrs
Protection Rings
Windows Architecture
Windows Security Elements
SAM Database
Local Security Authority
Subsystem Service
NetBIOS
Enumerating Techniques for
Windows
NetBIOS Enumerating
Net View
NBTSTAT
Nbtscan
User2sid and Sid2user
Other Tools
SNMP Enumeration
Other SNMP Enumeration Tools
DNS Zone Transfer
NetBIOS Null Sessions
SNMP Enumeration
Countermeasures
System Hacking Techniques 2 Hrs
Password Guessing
Automated Password Guessing
Password Sniffing
L0phtcrack
Keystroke Loggers
Hardware Key loggers
Software Key loggers Key logging Tools
Privilege Escalation
Password Cracking
Password Cracking Techniques
Dictionary Attack
Brute Force Attack
Stealing SAM
Cracking Tools
Clearing the Event Log File Hiding
-
8/7/2019 2433183Ad01
6/9
Trojans, Backdoors & Sniffers 2 Hrs
Trojans and Backdoors
Trojan Types
Remote Access Trojans (RATs) Trojan Attack Vectors
Wrappers
Covert Communication
Covert Storage Channel
Covert Timing Channel
Covert Communication Tools
Port Redirection
Net Cat
Sniffers
Sniffing Exploits
ARP Spoofing MAC Flooding
DNS Spoofing or Poisoning
Sniffing Tools
Snort
Dsniff
Ethereal
MAC Flooding Tools
ARP Poisoning Tools
Denial ofService Attacks & Session Hijacking 3 Hrs
Denial of Service/Distributed
Denial of Service (DoS/DDoS)
DOS Attacks
DDoS Attacks
Prevention of DoS Attacks
Prevention of DDoS Attacks
Session Hijacking
The TCP/IP Protocol Stack
Layered Protocol Roles
Sequence Numbers
Session Hijacking Steps
Tools for Session Hijacking
Protecting Against Session
Hijacking
Social Engineering & Physical Security 2 Hrs
Social Engineering
Human-Based (Person-to-
Person) Social
Engineering
Computer-Based Social
Engineering
Example Social Engineering
Attacks Motivations for Individuals to
Respond to Social Engineers
Reverse Social Engineering
Phishing
Hidden Frames
URL Obfuscation
HTML Image Mapping
Identity Theft
Defending Against Social
Engineering Attacks
Physical Security
Physical Security
Implementation
Company Facility Controls andIssues
Company Personnel Controls
Environmental Controls
Heating, Ventilation, and Air
Conditioning (HVAC)
-
8/7/2019 2433183Ad01
7/9
Fire Safety Controls
Access Controls
Fax Machines
Physical Facility Controls
Assessment Questions
Web Server and Database
Attacks
Firewall Intrusion Detection System & Honey Pots 2 Hrs
Firewalls
Firewall Types
Proxy Firewall
Packet Level Filtering Firewall
Stateful Inspection Firewalls
Hardware and Software Firewalls Firewall Architectures
Packet-Filtering Routers
Dual-Homed Hosts
Screened Host
Screened-Subnet Firewalls
Firewall Identification
Banner Grabbing
Port Scanning
Firewall Ports Scanning with TCP
Scanning with UDP
Breaching and Bypassing
Firewalls
Traceroute
ACK Tunneling
HTTP Tunneling
Firewall Backdoors
Firewall Informer
Intrusion Detection andResponse
Host-Based ID Systems
Network-Based ID systems
IDS Detection Methods
Statistical Anomaly Detection
Pattern Matching Detection
Protocol Detection
IDS Responses
Using an IDS in a SwitchedEnvironment
Intrusion Prevention Systems
Honey pots
Honey pot Applications
Viruses, Worms & Buffer Overflows 2 Hrs
Viruses
The Virus Lifecycle Macro Viruses
Polymorphic Viruses
Stealth Viruses
Spyware
Web Bugs
Spam bots
Pop-Up Downloads
Drive-By Downloads
-
8/7/2019 2433183Ad01
8/9
Bogus Spyware Removal
P
r
og
ram
s
Multistage and Blended
Threats
Worms
Virus and Worm
Examples
Explore. Zip
LoveLetter
Melissa Virus
Nimda Virus
Pretty Park
-
8/7/2019 2433183Ad01
9/9
Bugbear
Klez
Sir Cam Worm
Code Red Worm
Other Worms of Interest
Virus Scanners
Virus Prevention
Virus Detection