Fluke Infotech - Cyber Security

System and Network Security Introduction

In this Network security training course with us , you gain the knowledge and skills to analyze and assess network Vulnerabilities, and choose and deploy right countermeasures, evaluate methods for strong authentication, search for possible vulnerabilities in operating systems, and reduce your organization’s exposure to dangers in enterprise-wide and virtual private networks.

After the course you will be able to

  • Analyze your exposure to security threats
  • Save your organization's Machines and data
  • Deploy right Firewalls with appropriate data encryption to minimize threats
  • Assess alternative user and host authentication methods
  • Manage risks originating from inside the organization and the internet

 

This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. This is the only course which teaches both hacking and countermeasure techniques.

 

 

Introduction to Ethical Hacking

 

·         Footprinting, Scanning, and Enumeration

 

·         Hacking Web servers and Web applications

 

·         DoS, SQL injection, Buffer overflow attacks

 

·         Cryptography

 

·         Wireless hacking

 

·         Linux Hacking

 

·         Phishing

 

·         Countermeasures

 

Details of Course Content

 

Introduction to Ethical Hacking

What is Hacking

Who is a Hacker

Skills of a Hacker

Types of Hackers

Reasons for Hacking

Who are at the risk of Hacking attacks

Effects of Computer Hacking on an organization

Network Security Challenges

Elements of Information Security

The Security, Functionality & Usability Triangle

What is Ethical Hacking

Why Ethical Hacking is Necessary

Scope & Limitations of Ethical Hacking

What is Penetration Testing

What is Vulnerability Auditing

 

Foot Printing

What is Foot Printing

Objectives of Foot Printing

Finding a company’s details

Finding a company’s domain name

Finding a company’s Internal URLs

Finding a company’s Public and Restricted URLs

Finding a company’s Server details

Finding the details of domain registration

Finding the range of IP Address

Finding the DNS information

Finding the services running on the server

Finding the location of servers

Traceroute analysis

Tracking e-mail communications

 

Scanning

What is network scanning

Objectives of network scanning

Finding the live hosts in a network

SNMP Enumeration

SMTP Enumeration

DNS Enumeration

Finding open ports on a server

Finding the services on a server

OS fingerprinting

Server Banner grabbing tools

What is a Vulnerability Scanning

Vulnerability Scanner tools

Finding more details about a vulnerability

What is a proxy server

How does proxy server work

Types of proxy servers

How to find proxy servers

Why do hackers use proxy servers

What is a TOR network

Why hackers prefer to use TOR networks

 

Hacking Web Servers & Web Applications

What is a web server

Different webserver applications in use

Why are webservers hacked & its consequences

Directory traversal attacks

Website defacement

Website password brute forcing

How to defend against web server hacking

 

Session Hijacking

What is session hijacking

Dangers of session hijacking attacks

Session hijacking techniques

Cross-Site scripting attack

Session hijacking tools

How to defend against session hijacking

 

SQL Injection

What is SQL Injection

Effects of SQL Injection attacks

Types of SQL Injection attacks

SQL Injection detection tools

 

Evading Firewalls, IDS & Honeypots

What is a Firewall

What are the functions of a Firewall

What is an IDS

How does an IDS work

SPAN

IDS tools

What is a honeypot

Types of honeypots

Honeypot tools

Honeypot detection tools

 

Buffer Overflow

What is a buffer

Understanding usage of buffers in applications

What is buffer overflow

Simple buffer overflow in C programming

How to detect a buffer overflow

How to defend against buffer overflow attacks

 


Denial of Service

What is a DoS attack

What is a DDoS attack

Symptoms of a Dos attack

DoS attack techniques

What is a Botnet

Defending DoS attacks

 

Cryptography

What is Cryptography

Types of cryptography

Cipher algorithms

Public key infrastructure

What is a Hash

Cryptography attacks

 

System Hacking

What is system Hacking

Goals of System Hacking

Password Cracking

Password complexity

Finding the default passwords of network devices and softwares

Password cracking methods

o Online password cracking

§ Man-in-the-middle attack

§ Password guessing

o Offline password cracking

§ Brute force cracking

§ Dictionary based cracking

§ Hybrid attack

USB password stealers

Elcomsoft Distributed password recovery tools

Active password changer

What is a keylogger

How to deploy a keylogger to a remote pc

How to defend against a keylogger

 

Sniffers

What is a sniffer

How sniffer works

Types of sniffing

o Active sniffing

o Passive Sniffing

What is promiscuous mode

How to put a PC into promiscuous mode

What is ARP

ARP poison attack

Threats of ARP poison attack

How MAC spoofing works

MAC Flooding

What is a CAM Table

How to defend against MAC Spoofing attacks

How to defend against Sniffers in network

 

Phishing

What is Phishing

How Phishing website is hosted

How victims are tricked to access Phishing websites

How to differentiate a Phishing webpage from the original webpage

How to defend against Phishing attacks

 

Malware

What is malware

Types of malware

o Virus

§ What is a virus program

§ What are the properties of a virus program

§ How does a computer get infected by virus

§ Types of virus

§ Virus making tools

§ How to defend against virus attacks

o Worm

§ What is a worm program

§ How worms are different from virus

§ Trojan

§ What is a Trojan horse

§ How does a Trojan operate

§ Types of Trojans

§ Identifying Trojan infections

§ How to defend against Trojans

 

o Spyware

§ What is a spyware

§ Types of spywares

§ How to defend against spyware

§ Rootkits

§ What is a Rootkit

§ Types of Rootkits

§ How does Rootkit operate

§ How to defend against Rootkits

 

Kali Linux

What is Kali Linux

How Kali Linux is different from other Linux distributions

What are the uses of Kali Linux

Tools for Footprinting, Scanning & Sniffing

What is Metasploit framework

Using Metasploit framework to attack Wiindows machines

Using Metasploit framework to attack Android devices

 


Wireless Hacking

Types of wireless networks

Wi-Fi usage statistics

Finding a Wi-Fi network

Types of Wi-Fi authentications

o Using a centralized authentication server

o Using local authentication

Types of Wi-Fi encryption methods

o WEP

o WPA

o WPA2

How does WEP work

Weakness of WEP encryption

How does WPA work

How does WPA2 work

Hardware and software required to crack Wi-Fi networks

How to crack WEP encryption

How to crack WPA encryption

How to crack WPA2 encryption

How to defend against Wi-Fi cracking attacks

 

Penetration Testing

What is Penetration Testing

Types of Penetration Testing

What is to be tested

o Testing the network devices for mis-configuration

o Testing the servers and hosting applications for mis-configuration

o Testing the servers and hosting applications for vulnerabilities

o Testing wireless networks

o Testing for Denial of Service attacks

 

Counter Measure Techniques for Network level attacks

Types of Firewall

o Packet Filtering Firewall

o Circuit-Level Gateway Firewall

o Application-Level Firewall

o Stateful Multilayer Inspection Firewall

o Limitations of a Firewall

IDS / IPS

o What is an IDS

o What is a IPS

o Difference between IDS & IPS

o Placement of IDS in the Network

o Configuring an IDS in the Network

o Placement of IPS in the Network

o Configuring an IPS in the Network

UTM / Next-Generation Firewall

o What is a UTM

o Features of UTM

o Difference between a Firewall & a UTM

o Placement of UTM in the Network

o Configuring a UTM in the Network

o Monitoring attacks using UTM

o Configuring IPS module in UTM to detect and stop attacks

 

Counter Measure Techniques for Local Systems

Identifying the Vulnerabilities of a system

Understanding the Vulnerabilities of a system

o CVE ID

o Bugtraq ID

Patch Management

o Identifying the patch for a Vulnerability

o Downloading the Patch

o Testing the patch for stability in test environment

o Deploying the patch to Live Network

Finding the missing updates in an Operating System

o Microsoft Baseline Security Analyzer

o Belarc Advisor

 

Counter Measure Techniques for Malware Attacks

Scanning systems for Malware infections

Types of anti-malwares

o Anti-Virus

o Anti-Worm

o Anti-Trojan

o Anti-Rootkit

o Internet Security Suites

HIDS

HIPS