Ethical Hacking - Lesson 1: Introduction to Ethical Hacking...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Lesson 1: Introduction to Ethical Hacking Explaining the Certification Introducing Security Introducing Hacking Introduction to Ethical Hacking Lesson 2: Foot printing Defining Foot printing Information Gathering Methodology Locate the Network Range Hacking Tools Lesson 3: Scanning Definition of Scanning. Types of scanning Objectives of Scanning Scanning Methodology Classification of Scanning Hacking Tools Countermeasures Lesson 4: Enumeration What is Enumeration? NetBios Null Sessions Hacking Tools Enumerating User Accounts Active Directory Enumeration and Countermeasures Lesson 5: System Hacking Administrator Password Guessing Manual Password Cracking Algorithm Automated Password Cracking Password Types Types of Password Attacks Hacking Tools Lesson 6: Trojans and Backdoors Effect on Business What is a Trojan? Overt and Covert Channels Indications of a Trojan Attack Reverse Engineering Trojans Backdoor Countermeasures Lesson 7: Sniffers Definition of sniffing
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 3

Ethical Hacking - Lesson 1: Introduction to Ethical Hacking...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online