Certified Professional Hacker nxg offered by IIS
Certified Professional Hacker nxg at IIS Overview
Duration | 6 days |
Mode of learning | Online |
Credential | Certificate |
Certified Professional Hacker nxg at IIS Highlights
- Earn Certification after Completion by giving Test
Certified Professional Hacker nxg at IIS Course details
- The Certified Professional Hacker NxG is a revolution in the field of information security training. It goes far beyond the usual courses that talk about the same old port scanning and vulnerability assessments. It goes deep down into the depths of networking, systems, web applications and actual exploitation
Certified Professional Hacker nxg at IIS Curriculum
DAY 1
Session 1
What is Information Security?
CIA Triad
AAA
Hacking Phases
Ethical Hacking Concepts
Understanding common terms in hacking
Vulnerability Assessment
Penetration Testing
Concept of Red Teaming/Blue Teaming
Information Security Controls
Information Security Policies
Information Security Laws & Standards
Network Fundamentals
OS basics
Kali Linux
Session 2
Social Engineering
Techniques in Social Engineering
Social Engineering Tools
Reconnaissance
What is Reconnaissance?
Ways to Footprint
Various Footprinting Tools
Session 3
Network Scanning
Scanning Tools
Countermeasures
DAY 2
Session 1
Banner Grabbing and its Techniques
Enumeration and its Tools
Session 2
Understanding concept of Networking, Firewall, IDS/IPS, Switches, Port Mirroring etc.
Hacking Networks
VPN Hacking
Telnet & Rlogin Insecurities
DNS Spoofing
ARP poisoning
NETBIOS Insecurity
Testing & Evading Firewall
Cracking Passwords
Keylogger
Spyware
DAY 3
Session 1
Exploitation & Post-Exploitation Concepts
Privilege Escalation
Back Dooring a HOST - Trojans, Virus and Malware
DAY 4
Session 1
Global Standards/Frameworks
What is OWASP
Significant OWASP Projects
OWASP Top 10
The ‘OWASP Top 10’ for WebAppSec
Countermeasures of OWASP Top 10 2017 RC2
DAY 5
Session 1
Wireless Security Overview
Introduction 802.11 Standard
DAY 6
Session 1
Mobile Security Basics
OWASP Top 10 Mobile Risks - 2016
Android Security Basics
iOS Security Basics