Tuesday, March 24, 2009

Certified Ethical Hacker

This is the training for hacker candidate that will know or should be known if you want be a hacker. The material itself will be mastery the how to fools or paralyses the computer system. Hacking materials are about Reconnaissance; Scanning ; Gaining Access ; Maintaining Access till Clearing Tracks.

Persons that better have this knowledge like as:
  • IT Security Officers
  • IT Security Auditors
  • IT Security Professionals
  • Site Administrators
  • Everyone who want to know network security system
The material contains as follows:

1. Introduction to Ethical Hacking
2. Hacking Laws
3. Footprinting
4. Google Hacking
5. Scanning
6. Enumeration
7. System Hacking
8. Trojans and Backdoors
9. Viruses and Worms
10. Sniffers
11. Social Engineering
12. Phishing
13. Hacking Email Accounts
14. Denial-of-Service
15. Session Hijacking
16. Hacking Web Servers
17. Web Application Vulnerabilities
18. Web-Based Password Cracking Techniques
19. SQL Injection
20. Hacking Wireless Networks
21. Physical Security
22. Linux Hacking
23. Evading IDS, Firewalls and Detecting Honey Pots
24. Buffer Overflows
25. Cryptography
26. Penetration Testing
27. Covert Hacking
28. Writing Virus Codes
29. Assembly Language Tutorial
30. Exploit Writing
31. Smashing the Stack for Fun and Profit
32. Windows Based Buffer Overflow Exploit Writing
33. Reverse Engineering
34. MAC OS X Hacking
35. Hacking Routers, cable Modems and Firewalls
36. Hacking Mobile Phones, PDA and Handheld Devices
37. Bluetooth Hacking
38. VoIP Hacking
39. RFID Hacking
40. Spamming
41. Hacking USB Devices
42. Hacking Database Servers
43. Cyber Warfare- Hacking, Al-Qaida and Terrorism
44. Internet Content Filtering Techniques
45. Privacy on the Internet
46. Securing Laptop Computers
47. Spying Technologies
48. Corporate Espionage- Hacking Using Insiders
49. Creating Security Policies
50. Software Piracy and Warez
51. Hacking and Cheating Online Games
52. Hacking RSS and Atom
53. Hacking Web Browsers (Firefox, IE)
54. Proxy Server Technologies
55. Data Loss Prevention
56. Hacking Global Positioning System (GPS)
57. Computer Forensics and Incident Handling
58. Credit Card Frauds
59. How to Steal Passwords
60. Firewall Technologies
61. Threats and Countermeasures
62. Case Studies
63. Botnets
64. Economic Espionage
65. Patch Management
66. Security Convergence
67. Identifying the Terrorist