Tuesday, January 15, 2013

CERTIFIED CYBER SECURITY EXPERT AND CEH SYLLABUS

Session 1: Cyber Ethics, Hacking introduction.
Session 2: Basic Networking Terminologies
Session 3: Information Gathering and foot-printing
Session 4: Scanning and Enumeration
Session 5: Trojans and Backdoors
Session 6: Virus and Worms
Session 7: Sniffers and keyloggers
Session 8: Phishing and its preventions
Session 9: System Hacking and Security
Session 10: Social Engineering and Honey pots
Session 11: Bots, Botnets and DoS
Session 12: Cryptography
Session 13: Google Hacking Databases
Session 14: SQL injection 1
Session 15: SQL injection 2
Session 16: Proxy servers and VPNs
Session 17: Cross site Scripting ( XSS )
Session 18: Local File Inclusion / Remote File Inclusion ( LFI / RFI )
Session 19: Secure Coding practises
Session 20: Information Disclosure vulnerabilities
Session 21: Session Hijacking ( Side jacking )
Session 22: Hacking web servers
Session 23: Vulnerability Assessment and Penetration Testing ( VAPT )
Session 24: Assembly language basics
Session 25: Buffer Overflow attacks 1
Session 26: Buffer Overflow attacks 2
Session 27: Exploit writing
Session 28: Metasploit framework
Session 29: Reverse Engineering
Session 30: Firewalls, IDS and Evading IDS
Session 31: Wireless hacking
Session 32: Mobile and VOIP hacking
Session 33: Bluetooth hacking
Session 34: Cyber crime investigation and IT ACT 2000
Session 35: Case studies of various cases solved by Techdefence
Session 36: Cyber Forensics
Session 37: Enterprise Information Security Management
Session 38: Project work 1
Session 39: Project work 2
Session 40: Online Examination


No comments:

Post a Comment