Vskills certification for Ethical Hacking and Security Professional assesses the candidate for testing and managing company’s information security. The certification tests the candidates on various areas in ethical hacking and security which includes knowledge of ethics and countermeasures for attacks on system, network (wired and wireless), operating system (Windows and Linux) and web based attacks.
http://www.vskills.in/certification/Certified-Ethical-Hacking-and-Security-Professional
2. Certified Ethical Hacking and Security Professional
www.vskills.in
CCCCertifiedertifiedertifiedertified Ethical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and Security
ProfessionalProfessionalProfessionalProfessional
Certification CodeCertification CodeCertification CodeCertification Code VS-1078
Vskills certification for Ethical Hacking and Security Professional assesses the candidate for
testing and managing company’s information security. The certification tests the candidates
on various areas in ethical hacking and security which includes knowledge of ethics and
countermeasures for attacks on system, network (wired and wireless), operating system
(Windows and Linux) and web based attacks.
Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification?
This Course is intended for professionals and graduates wanting to excel in their chosen
areas. It is also well suited for those who are already working and would like to take
certification for further career progression.
Earning Vskills Ethical Hacking and Security Professional Certification can help candidate
differentiate in today's competitive job market, broaden their employment opportunities by
displaying their advanced skills, and result in higher earning potential.
Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?
Job seekers looking to find employment in IT or information security department of
various companies, students generally wanting to improve their skill set and make their CV
stronger and existing employees looking for a better role can prove their employers the
value of their skills through this certification
Test DetailsTest DetailsTest DetailsTest Details
• Duration:Duration:Duration:Duration: 60 minutes
• No. of questions:No. of questions:No. of questions:No. of questions: 50
• Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%)
There is no negative marking in this module.
FFFFee Structureee Structureee Structureee Structure
Rs. 4,500/- (Includes all taxes)
CompaniesCompaniesCompaniesCompanies that hire Vskills Certifiedthat hire Vskills Certifiedthat hire Vskills Certifiedthat hire Vskills Certified Ethical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and Security
ProfessionalProfessionalProfessionalProfessional
Ethical Hacking and Security professionals are in great demand. Private and public
companies are constantly hiring knowledgeable professionals for their testing and
management of information security measures for a secured environment.
3. Certified Ethical Hacking and Security Professional
www.vskills.in
Table of Contents
1.1.1.1. IntroductionIntroductionIntroductionIntroduction
1.1 Ethical Hacking Evolution and Hacktivism
1.2 Need and Technical Terms
1.3 Skills Needed and Stages of Hacking
1.4 Ethical Hacking Modes
1.5 Networking Basics
1.6 Penetration Testing
2.2.2.2. EthicsEthicsEthicsEthics
2.1 Moral Direction and Hacker Ethics Principles
2.2 Security Grey Areas
2.3 Cyber Laws (IT Act, etc.)
2.4 Rules of Engagement
3.3.3.3. CryptographyCryptographyCryptographyCryptography
3.1 Cryptography Basics
3.2 Evolution and Data Encryption Methods
3.3 Symmetric and Asymmetric key Cryptography
3.4 Private and Public Key Exchange
3.5 Stream and Block Ciphers
3.6 Secret Key Cryptography
3.7 Message Authentication and Hash Functions
3.8 Digital Signatures and Public Key Infrastructure
4.4.4.4. FootprintingFootprintingFootprintingFootprinting
4.1 Information Gathering
4.2 DNS, whois and ARIN records
4.3 Using traceroute, e-mail tracking and web spider
4.4 Google Hacking
5.5.5.5. Social EngineeringSocial EngineeringSocial EngineeringSocial Engineering
5.1 Social Engineering Concepts
5.2 Social Engineering Attack Types
5.3 Countermeasures for Social Engineering
6.6.6.6. Physical SecurityPhysical SecurityPhysical SecurityPhysical Security
6.1 Basics and Need
6.2 Physical Security Countermeasures
7.7.7.7. Network Scanning and EnumerationNetwork Scanning and EnumerationNetwork Scanning and EnumerationNetwork Scanning and Enumeration
7.1 Network Scanning Techniques
7.2 Scanners and Analyzers
4. Certified Ethical Hacking and Security Professional
www.vskills.in
7.3 HTTP tunneling and IP spoofing
7.4 Enumerating null sessions and SNMP enumeration
8.8.8.8. Network AttacksNetwork AttacksNetwork AttacksNetwork Attacks
8.1 TCP/IP Packet Formats and Ports
8.2 Firewall and IDS
8.3 Switch Attacks
8.4 Router Attacks
8.5 DoS, DDoS, Session Hijacking
9.9.9.9. Wireless NetworksWireless NetworksWireless NetworksWireless Networks
9.1 Wireless LAN Basics
9.2 WLAN Security
9.3 WLAN Attacks
9.4 WLAN Attack Countermeasures
10.10.10.10. System HackingSystem HackingSystem HackingSystem Hacking
10.1 Password Attacks, Vulnerabilities and Countermeasure
10.2 Spyware
10.3 Rootkit
10.4 Steganography
10.5 Trojans
10.6 Computer worm
10.7 Backdoor
10.8 Buffer Overflow
11.11.11.11. Windows HackingWindows HackingWindows HackingWindows Hacking
11.1 Memory and Process
11.2 Windows Architecture
11.3 Windows Security
11.4 Windows Attacks
11.5 Countermeasures
11.6 Windows Memory Protection, SEH and OllyDbg
12.12.12.12. Linux HackingLinux HackingLinux HackingLinux Hacking
12.1 Linux Basics
12.2 Linux Threats
12.3 Linux Security
12.4 Kernel Patching
13.13.13.13. Web HackingWeb HackingWeb HackingWeb Hacking
13.1 Web Basics
13.2 Web Server Attacks
13.3 Web Application Attacks
13.4 VoIP Attacks
5. Certified Ethical Hacking and Security Professional
www.vskills.in
14.14.14.14. Emerging TrendsEmerging TrendsEmerging TrendsEmerging Trends
14.1 Cloud Computing and Security
14.2 Identity Access Management
14.3 Security Policies
14.4 Mobile Security
14.5 New Threats
6. Certified Ethical Hacking and Security Professional
www.vskills.in
Sample QuestionsSample QuestionsSample QuestionsSample Questions
1.1.1.1. TheTheTheThe term DDoS expands toterm DDoS expands toterm DDoS expands toterm DDoS expands to _______._______._______._______.
A. Divisive Denial of Service
B. Distributed Denial of Service
C. Detailed Denial of Service
D. None of the above
2222. The. The. The. The software Metasploit is used for _______.software Metasploit is used for _______.software Metasploit is used for _______.software Metasploit is used for _______.
A. Anti-virus
B. Vulnerability Assessment
C. Anti-malware
D. None of the above
3333. The. The. The. The term XSS refers toterm XSS refers toterm XSS refers toterm XSS refers to _______._______._______._______.
A. eXtended Site Scripting
B. eXtreme Secured Services
C. Cross site scripting
D. None of the above
4444. The. The. The. The tool OllDbg is used for analyzing code for which operating system _______.tool OllDbg is used for analyzing code for which operating system _______.tool OllDbg is used for analyzing code for which operating system _______.tool OllDbg is used for analyzing code for which operating system _______.
A. Microsoft Windows
B. Linux
C. Macintosh
D. None of the above
5555. The. The. The. The operating system back track is used foroperating system back track is used foroperating system back track is used foroperating system back track is used for _______._______._______._______.
A. Penetration testing
B. Virus scanning and removal
C. Malware scanning and removal
D. None of the above
Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)