Wednesday, February 11, 2009

Certified Ethical Hacker (CEH) V6

Certified training will describe about the definition and basic concept of hacking activity for confusing, tricking until computer disorder. On this material is based on 5 basic step for a hacker, beginning from Reconnaissance; Scanning; Gaining Access; Maintaining Access and Clearing Tracks.

This knowledge is good for;

  • IT Security Officers
  • IT Security Auditors
  • IT Security Professionals
  • Site Administrators
  • Other practitioner of networking

Material Contents:

  1. Introduction to Ethical Hacking
  2. Hacking Laws
  3. Footprinting
  4. Google Hacking
  5. Scanning
  6. Enumeration
  7. System Hacking
  8. Trojans and Backdoors
  9. Viruses and Worms
  10. Sniffers
  11. Social Engineering
  12. Phishing
  13. Hacking Email Accounts
  14. Denial-of-Service
  15. Session Hijacking
  16. Hacking Web Servers
  17. Web Application Vulnerabilities
  18. Web-Based Password Cracking Techniques
  19. SQL Injection
  20. Hacking Wireless Networks
  21. Physical Security
  22. Linux Hacking
  23. Evading IDS, Firewalls and Detecting Honey Pots
  24. Buffer Overflows
  25. Cryptography
  26. Penetration Testing
  27. Covert Hacking
  28. Writing Virus Codes
  29. Assembly Language Tutorial
  30. Exploit Writing
  31. Smashing the Stack for Fun and Profit
  32. Windows Based Buffer Overflow Exploit Writing
  33. Reverse Engineering
  34. MAC OS X Hacking
  35. Hacking Routers, cable Modems and Firewalls
  36. Hacking Mobile Phones, PDA and Handheld Devices
  37. Bluetooth Hacking
  38. VoIP Hacking
  39. RFID Hacking
  40. Spamming
  41. Hacking USB Devices
  42. Hacking Database Servers
  43. Cyber Warfare- Hacking, Al-Qaida and Terrorism
  44. Internet Content Filtering Techniques
  45. Privacy on the Internet
  46. Securing Laptop Computers
  47. Spying Technologies
  48. Corporate Espionage- Hacking Using Insiders
  49. Creating Security Policies
  50. Software Piracy and Warez
  51. Hacking and Cheating Online Games
  52. Hacking RSS and Atom
  53. Hacking Web Browsers (Firefox, IE)
  54. Proxy Server Technologies
  55. Data Loss Prevention
  56. Hacking Global Positioning System (GPS)
  57. Computer Forensics and Incident Handling
  58. Credit Card Frauds
  59. How to Steal Passwords
  60. Firewall Technologies
  61. Threats and Countermeasures
  62. Case Studies
  63. Botnets
  64. Economic Espionage
  65. Patch Management
  66. Security Convergence
  67. Identifying the Terrorist

No comments: