Part-1 Security Essentials
Lecture-1 Course Overview
· Areas of Focus and Exam Info
· Course Is and Isn't
Lecture-2 Introduction to Ethical Hacking
· Cybersecurity Overview
· Threats and Attack Vectors
· Attack Concepts
· Understanding the Legal Aspects of Penetration Testing
· Exploring Penetration Testing Methodologies
· Attack Phases
· Attack Types
· InfoSec Policies
· Practical Exercise
Lecture-3 Footprinting and Recon
· Footprinting Concepts
· Footprinting Objectives
· Footprinting Methodologies
· Search Engines
· Finding People
· Competitive Intelligence
· Websites
· Email Tracking
· Network Discovery
· DNS/Whois
· Social Engineering
· Employee Online Activities
· Footprinting Tools
· Footprinting Countermeasures
· Penetration Testing: Footprinting and Recon
· Practical Exercise
Lecture-4 Scanning Networks
· Network Scanning Overview
· Scanning Techniques
· TCP/UDP Refresher
· TCP Scanning Types
· More TCP Scanning Techniques
· Nmap Demo
· IDS Evasion
· Banner Grabbing
· Vulnerability Scanning
· Network Diagramming
· Using and Chaining Proxies
· HTTP and SSH Tunneling
· Anonymizers
· IP Spoofing and Countermeasures
· Penetration Testing: Scanning Networks
· Practical Exercise
Part-2 System Security
Lecture-5 Enumeration
· Enumeration Overview
· NetBIOS Enumeration
· Users and Default Passwords
· SNMP Enumeration
· Linux Enumeration
· LDAP, NTP, SMTP, DNS Enumeration
· Enumerating IKE, IPsec, VPNs
· Enumeration Countermeasures
· Penetration Testing: Enumeration
· Practical Exercise
Lecture-6 Vulnerability Analysis
· Introducing Vulnerability Research and Classification
· Exploring Vulnerability Assessment
· Vulnerability Management Lifecycle (Vulnerability Assessment Phases)
· Understanding Different Approaches of Vulnerability Assessment Solutions
· Overview of Vulnerability Scoring Systems
· Vulnerability Assessment Tools
· Overview of Vulnerability Assessment Reports
· Practical Exercise
Lecture-7 System Hacking
· Hacking Methodology
· Password Cracking
· Keyloggers and Anti-keyloggers
· Microsoft Authentication
· Defense Against Password Cracking
· Privilege Escalation
· Executing Applications
· Rootkits and Anti-rootkits
· NTFS Stream Manipulation
· Steganography and Steganalysis Methods
· Covering Tracks
· Penetration Testing: System Hacking
· Practical Exercise
Lecture-8 Malware Threats
· Understanding Malware and Malware Propagation Techniques
· Trojans, Backdoors, Viruses, Worms
· Indications of Infection
· Common Ports
· How Malware Gets Into a System
· How to Detect
· Anti-malware Software
· Online Malware Analysis Services
· Countermeasures
· Penetration Testing: Malware Threats
· Practical Exercise
Lecture-9 Sniffing
· Sniffing Overview
· Sniffing Attack Types
· Protocol Analyzers
· Sniffing Tools
· Sniffing Detection and Defense
· Penetration Testing: Sniffing
· Practical Exercise
Lecture-10 Social Engineering
· Social Engineering Concepts
· Social Networking
· Identity Theft
· Social Engineering Countermeasures
· Understanding Social Engineering
· Surveying Social Engineering Methodologies
· Understanding How to Target Employees
· Exploring Social Engineering Tools
· Exploring the Social Engineering Toolkit (SET)
· Surveying Social Engineering Case Studies
· Penetration Testing: Social Engineering
· Practical Exercise
Part-3 Network Security
Lecture-11 Denial-of-Service (DoS)
· DoS/DDoS Overview
· DoS Techniques
· Botnets
· DoS Attack Tools
· Detection and Countermeasures
· DDoS Protection Tools
· Penetration Testing: DoS
· Practical Exercise
Lecture-12 Session Hijacking
· What Is Session Hijacking?
· Techniques
· Application Level Session Hijacking
· MitM Attacks
· Cross-site Attacks
· Network Level Hijacking
· Session Hijacking Tools
· Hijacking Protection
· Penetration Testing: Session Hijacking
· Practical Exercise
Part-4 Web Services Security
Lecture-13 Hacking Webservers
· What Is Session Hijacking?
· Techniques
· Application Level Session Hijacking
· MitM Attacks
· Cross-site Attacks
· Network Level Hijacking
· Session Hijacking Tools
· Hijacking Protection
· Penetration Testing: Session Hijacking
· Practical Exercise
Lecture-14 Hacking web Applications
· Attack Vectors and Threats
· Footprinting
· Authentication and Authorization System Attacks
· Understanding the Need for Web Application Penetration Testing
· Exploring How Web Applications Have Evolved Over Time
· Understanding the Web Application Protocols
· Exploring the HTTP Request and Response
· Surveying Session Management and Cookies
· Understanding the APIs
· Exploring the Tools Used to Test the APIs
· Exploring Cloud Services
· Exploring Web Application Frameworks
· Surveying Docker Containers
· Introducing DevOps
· Understanding Authentication Schemes in Web Applications
· Exploring Session Management Mechanisms and Related Vulnerabilities
· Database Connectivity Attacks
· Practical Exercise
Lecture-15 Advanced Web Application Hacking
· Understanding What is Command Injection
· Exploiting Command Injection Vulnerabilities
· Understanding What is XML Injection
· Exploiting XML Injection Vulnerabilities
· Undertanding How to Mitigate Injection Vulnerabilities
· Understanding What is XSS
· Exploiting Reflected XSS Vulnerabilities
· Exploiting Stored XSS Vulnerabilities
· Exploiting DOM Based XSS Vulnerabilities
· Understanding Cross-Site Request Forgery (CSRF)
· Exploiting CSRF Vulnerabilities
· Evading Web Application Security Controls
· Mitigating XSS and CSRF Vulnerabilities
· Surveying the Client-side Code and Storage
· Understanding HTML5 Implementations
· Understanding AJAX Implementations
· Mitigating AJAX, HTML5, and Client-side Vulnerabilities
· Understanding the Other Common Security Flaws in Web Applications
· Exploiting Insecure Direct Object References and Path Traversal
· Surveying Information Disclosure Vulnerabilities
· Fuzzing Web Applications
· Web Application Security Tools
· Web Application Firewalls
· Practical Exercise
Lecture-16 SQL Injection
· Overview
· Attacks Using SQL Injection
· Methodology
· Understanding SQL Injection
· Exploiting SQL Injection Vulnerabilities
· SQL Injection Defense
· Detection Tools
· Practical Exercise
Part-5 Wireless and Internet Security
Lecture-17 Hacking Wireless
· Wireless LAN Overview
· Wireless Encryption
· Wireless Threats
· Understanding Wireless Antennas
· Surveying Wi-Fi Devices Like the Pinneaple
· Building Your Own Lab
· Introducing the Aircrack-ng Suite
· Introducing Airmon-ng
· Understanding Airodump-ng
· Introducing Aireplay-ng
· Introducing Airdecap-ng
· Introducing Airserv-ng
· Introducing Airtun-ng
· Understanding WEP Fundamentals
· Learning How to Crack WEP
· Understanding WPA Fundamentals
· Surveying Attacks Against WPA2-PSK Networks
· Using coWPAtty
· Using Pyrit
· Exploring WPA Enterprise Hacking
· Using Kismet
· Using Wireshark
· Defining Evil Twin Attacks
· Performing Evil Twin Attacks
· Using Karmetasploit
· Bluetooth and Bluejacking
· Understanding Bluetooth Vulnerabilities
· Surveying Tools for Bluetooth Monitoring
· Wireless Attack Defense
· Wireless IPS
· Practical Exercise
Lecture-18 IDS, Firewalls, and Honeypots
· IDS, Firewall, and Honeypot Concepts
· Firewall Tools
· Honeypot Tools
· IDS Tools
· Evading IDS and Firewalls
· Evading IDS and Firewall Tools
· Detecting Honeypots
· Penetration Testing: IDS, Firewalls, and Honeypots
· Practical Exercise
Lecture-19 Cloud Computing
· Overview
· Providers
· Detection
· Instance and VPC Security Methods
· Cloud Use as a Pen Testing Source
· Understanding the Challenge of Testing Cloud Services
· Exploring How to Test in the Cloud
· Practical Exercise
Lecture-20 Cryptography
· Overview
· Algorithms
· Tools
· Public Key Infrastructure
· Email
· Disk Encryption and Tools
· Attacks Against Cryptography
· Cryptanalysis Tools
· Practical Exercise
Lecture-21 IoT Hacking
· Understanding IoT Fundamentals
· Exploring ZigBee and IEEE 802.15.4
· Exploring INSTEON
· Exploring ZWave
· Exploring LoRA
· Overview of IoT Penetration Testing
· IoT Security Tools
· Practical Exercise
Lecture 22: Hacking Mobile Platform
· Understanding OWASP Mobile Device Vulnerabilities
· Wrestling with the BYOD Dilemma
· Understanding Mobile Device Management (MDM)
· Understanding Mobile Device Security Policies
· Exploring The Android Security Model
· Exploring Android Emulators and SDK
· Understanding Android Hacking Tools and Methodologies
· Introducing iOS Security
· Exploring Jailbraking iOS
· Surveying Tools for Dissasembling iOS Applications
· Understanding Mobile Spyware
· Exploring How to Make Your Own STORM-like Mobile Hacking Device
· Practical Exercise