2433183ad01

Upload: tirthankar-chakraborty

Post on 09-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 2433183Ad01

    1/9

    BA-86, Sector 1, Saltlake, Kolkata-700064, Ph.-

    +919007018662

    N E T WORK I N G , S E C U R I T Y & ET H I C AL HACK I NG COU R S E

    S T R U C T U R E

    Basic Network Concepts 2 Hrs Identifying Characteristics of a

    Network

    Servers, Workstations, and Hosts

    WANs, LANs, and MANs

    Types of Networks

    Internet, Intranet, and Extranet

    Identifying Network Topologies

    Bus Topologies

    Star Topologies

    Mesh Topologies

    Ring Topologies

    Hybrid Topologies

    Wireless Topologies

    Point-to-Point and Point-

    to- Multipoint

    Segments and Backbones

    Network Media and Connectors

    Coaxial Cable

    Twisted-Pair Cable

    Fiber-Optic Cable

    Connector Types

    Access Methods

    CSMA/CD

    CSMA/CA

    Token Passing

    Network Architectures

    Broadband and Baseband

    Ethernet

    Token Ring

    FDDI

    Network Operating Systems

    Windows Servers

    Network Protocols & Standards 3 Hrs

    Network Protocols

    NetBEUI

    What Is NetBIOS?

    IPX/SPX

    AppleTalk

    TCP/IP

    Routable vs. Non-routable

    Protocols

    The OSI Model

    Layer 7: The Application Layer

    Layer 6: The Presentation Layer

    Layer 5: The Session Layer

    Layer 4: The Transport Layer

    Layer 3: The Network Layer

    Layer 2: The Data Link Layer

    Layer 1: The Physical Layer

    Protocols and the OSI Layers

    Viewing Protocol

    Information with Network

    Monitor

    802 Project Standards

    IEEE 802 Categories

    mailto:email:%[email protected]://www.zetalabs.org/
  • 8/7/2019 2433183Ad01

    2/9

    Networking Components

    Network Interface Cards

    Transceivers

    MAC Address

    Determining Your Local

    Machines MAC Address

    Hubs and Repeaters

    Multistation Access Units

    Repeaters

    Bridges and Switches

    Bridges

    Switches

    Routers and Brouters

    Gateways and Security Devices

    Gateways

    Firewalls

    Intrusion Detection Systems

    Other Networking Devices

    Wireless Access Points

    Modems

    ISDN

    TCP/IP Fundamentals 2 Hrs

    TCP/IP Protocol Suite

    The TCP/IP Model

    Application-Layer Protocols

    TCP/IP Fundamentals

    TCP/IP Settings

    TCP/IP Addressing

    Understanding Binary

    Address Classes

    Loopback Address

    Private Addresses

    Addressing Schemes

    IPv6

    TCP/IP Ports

    Viewing TCP/IP Port Values

    TCP/IP Configuration Concepts

    Manual Configuration

    Dynamic Host Configuration

    Protocol (DHCP)

    Boot Protocol

    Domain Name System

    Windows Internet Naming

    Service

    DHCP

    DNS

    WINS

    NAT/PAT

    TCP/IP Utilities 4 Hrs

    ARP

    How ARP Works

    ARP Cache

    Using ARP to See Your Local

    ARP Cache

    RARP

  • 8/7/2019 2433183Ad01

    3/9

    Telnet

    How Telnet Works

    Using Telnet

    NBTSTAT

    How NetBIOS over TCP/IPWorks

  • 8/7/2019 2433183Ad01

    4/9

    Using NBTSTAT

    Using NBTSTAT to View

    NetBIOS

    Name Tables Tracert

    Using Tracert

    Netstat

    How Netstat Works

    Netstat Options

    Troubleshooting with Netstat

    IPCONFIG and WINIPCFG

    IPCONFIG

    WINIPCFG IFCONFIG

    FTP

    How FTP Works

    Configuring FTP

    Ping and Hping2

    How Ping Works

    Ping Options Troubleshooting with Ping

    Hping2

    NSLOOKUP and DIG

    How NSLOOKUP Works

    NSLOOKUP Options

    DIG

    Other TCP/IP Utilities

    Hostname and Host

    MTR Route

    Troubleshooting with

    TCP/IP Utilities

    Introduction to Ethical Hacking 2 Hrs

    Terminology

    Hackers, Crackers, and Other

    Related Terms

    Threats

    Hacking History

    Ethical Hacking Objectives and

    Motivations

    Hacker and Ethical Hacker

    Characteristics and Operations

    Skills Needed by an Ethical

    Hacker

    Types of Information SystemSecurity Testing

    Ethical Hacking Outputs

    Protections and Obligations

    for the Ethical Hacker

    Related Types of Computer

    Crime

    Foot Printing 2 Hrs

    Gathering Information

    Whois

    Nslookup

    Open Source Searching

    Locating the Network Range

    Determining the Network Range

    with ARIN

    Traceroute and TTL

    Email Tracking Programs

    Scanning 2 Hrs

  • 8/7/2019 2433183Ad01

    5/9

    Identifying Active Machines

    Ping

    Ping Sweeps

    Ping Tools

    Identifying Open Ports andAvailable Services

    Port Scanning

    TCP/UDP Scanning Types

    Determining the Operating

    System

    Scanning Tools

    Vulnerable Ports

    Port Scanning Issues

    Banner Grabbing

    War Driving and War Walking Fingerprinting

    Passive Fingerprinting

    Mapping the Network

    Enumerating 2 Hrs

    Protection Rings

    Windows Architecture

    Windows Security Elements

    SAM Database

    Local Security Authority

    Subsystem Service

    NetBIOS

    Enumerating Techniques for

    Windows

    NetBIOS Enumerating

    Net View

    NBTSTAT

    Nbtscan

    User2sid and Sid2user

    Other Tools

    SNMP Enumeration

    Other SNMP Enumeration Tools

    DNS Zone Transfer

    NetBIOS Null Sessions

    SNMP Enumeration

    Countermeasures

    System Hacking Techniques 2 Hrs

    Password Guessing

    Automated Password Guessing

    Password Sniffing

    L0phtcrack

    Keystroke Loggers

    Hardware Key loggers

    Software Key loggers Key logging Tools

    Privilege Escalation

    Password Cracking

    Password Cracking Techniques

    Dictionary Attack

    Brute Force Attack

    Stealing SAM

    Cracking Tools

    Clearing the Event Log File Hiding

  • 8/7/2019 2433183Ad01

    6/9

    Trojans, Backdoors & Sniffers 2 Hrs

    Trojans and Backdoors

    Trojan Types

    Remote Access Trojans (RATs) Trojan Attack Vectors

    Wrappers

    Covert Communication

    Covert Storage Channel

    Covert Timing Channel

    Covert Communication Tools

    Port Redirection

    Net Cat

    Sniffers

    Sniffing Exploits

    ARP Spoofing MAC Flooding

    DNS Spoofing or Poisoning

    Sniffing Tools

    Snort

    Dsniff

    Ethereal

    MAC Flooding Tools

    ARP Poisoning Tools

    Denial ofService Attacks & Session Hijacking 3 Hrs

    Denial of Service/Distributed

    Denial of Service (DoS/DDoS)

    DOS Attacks

    DDoS Attacks

    Prevention of DoS Attacks

    Prevention of DDoS Attacks

    Session Hijacking

    The TCP/IP Protocol Stack

    Layered Protocol Roles

    Sequence Numbers

    Session Hijacking Steps

    Tools for Session Hijacking

    Protecting Against Session

    Hijacking

    Social Engineering & Physical Security 2 Hrs

    Social Engineering

    Human-Based (Person-to-

    Person) Social

    Engineering

    Computer-Based Social

    Engineering

    Example Social Engineering

    Attacks Motivations for Individuals to

    Respond to Social Engineers

    Reverse Social Engineering

    Phishing

    Hidden Frames

    URL Obfuscation

    HTML Image Mapping

    Identity Theft

    Defending Against Social

    Engineering Attacks

    Physical Security

    Physical Security

    Implementation

    Company Facility Controls andIssues

    Company Personnel Controls

    Environmental Controls

    Heating, Ventilation, and Air

    Conditioning (HVAC)

  • 8/7/2019 2433183Ad01

    7/9

    Fire Safety Controls

    Access Controls

    Fax Machines

    Physical Facility Controls

    Assessment Questions

    Web Server and Database

    Attacks

    Firewall Intrusion Detection System & Honey Pots 2 Hrs

    Firewalls

    Firewall Types

    Proxy Firewall

    Packet Level Filtering Firewall

    Stateful Inspection Firewalls

    Hardware and Software Firewalls Firewall Architectures

    Packet-Filtering Routers

    Dual-Homed Hosts

    Screened Host

    Screened-Subnet Firewalls

    Firewall Identification

    Banner Grabbing

    Port Scanning

    Firewall Ports Scanning with TCP

    Scanning with UDP

    Breaching and Bypassing

    Firewalls

    Traceroute

    ACK Tunneling

    HTTP Tunneling

    Firewall Backdoors

    Firewall Informer

    Intrusion Detection andResponse

    Host-Based ID Systems

    Network-Based ID systems

    IDS Detection Methods

    Statistical Anomaly Detection

    Pattern Matching Detection

    Protocol Detection

    IDS Responses

    Using an IDS in a SwitchedEnvironment

    Intrusion Prevention Systems

    Honey pots

    Honey pot Applications

    Viruses, Worms & Buffer Overflows 2 Hrs

    Viruses

    The Virus Lifecycle Macro Viruses

    Polymorphic Viruses

    Stealth Viruses

    Spyware

    Web Bugs

    Spam bots

    Pop-Up Downloads

    Drive-By Downloads

  • 8/7/2019 2433183Ad01

    8/9

    Bogus Spyware Removal

    P

    r

    og

    ram

    s

    Multistage and Blended

    Threats

    Worms

    Virus and Worm

    Examples

    Explore. Zip

    LoveLetter

    Melissa Virus

    Nimda Virus

    Pretty Park

  • 8/7/2019 2433183Ad01

    9/9

    Bugbear

    Klez

    Sir Cam Worm

    Code Red Worm

    Other Worms of Interest

    Virus Scanners

    Virus Prevention

    Virus Detection