SlideShare a Scribd company logo
1 of 7
Download to read offline
Certified Ethical Hacking and
Security Professional
VS-1078
Certified Ethical Hacking and Security Professional
www.vskills.in
CCCCertifiedertifiedertifiedertified Ethical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and Security
ProfessionalProfessionalProfessionalProfessional
Certification CodeCertification CodeCertification CodeCertification Code VS-1078
Vskills certification for Ethical Hacking and Security Professional assesses the candidate for
testing and managing company’s information security. The certification tests the candidates
on various areas in ethical hacking and security which includes knowledge of ethics and
countermeasures for attacks on system, network (wired and wireless), operating system
(Windows and Linux) and web based attacks.
Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification?
This Course is intended for professionals and graduates wanting to excel in their chosen
areas. It is also well suited for those who are already working and would like to take
certification for further career progression.
Earning Vskills Ethical Hacking and Security Professional Certification can help candidate
differentiate in today's competitive job market, broaden their employment opportunities by
displaying their advanced skills, and result in higher earning potential.
Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?
Job seekers looking to find employment in IT or information security department of
various companies, students generally wanting to improve their skill set and make their CV
stronger and existing employees looking for a better role can prove their employers the
value of their skills through this certification
Test DetailsTest DetailsTest DetailsTest Details
• Duration:Duration:Duration:Duration: 60 minutes
• No. of questions:No. of questions:No. of questions:No. of questions: 50
• Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%)
There is no negative marking in this module.
FFFFee Structureee Structureee Structureee Structure
Rs. 4,500/- (Includes all taxes)
CompaniesCompaniesCompaniesCompanies that hire Vskills Certifiedthat hire Vskills Certifiedthat hire Vskills Certifiedthat hire Vskills Certified Ethical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and Security
ProfessionalProfessionalProfessionalProfessional
Ethical Hacking and Security professionals are in great demand. Private and public
companies are constantly hiring knowledgeable professionals for their testing and
management of information security measures for a secured environment.
Certified Ethical Hacking and Security Professional
www.vskills.in
Table of Contents
1.1.1.1. IntroductionIntroductionIntroductionIntroduction
1.1 Ethical Hacking Evolution and Hacktivism
1.2 Need and Technical Terms
1.3 Skills Needed and Stages of Hacking
1.4 Ethical Hacking Modes
1.5 Networking Basics
1.6 Penetration Testing
2.2.2.2. EthicsEthicsEthicsEthics
2.1 Moral Direction and Hacker Ethics Principles
2.2 Security Grey Areas
2.3 Cyber Laws (IT Act, etc.)
2.4 Rules of Engagement
3.3.3.3. CryptographyCryptographyCryptographyCryptography
3.1 Cryptography Basics
3.2 Evolution and Data Encryption Methods
3.3 Symmetric and Asymmetric key Cryptography
3.4 Private and Public Key Exchange
3.5 Stream and Block Ciphers
3.6 Secret Key Cryptography
3.7 Message Authentication and Hash Functions
3.8 Digital Signatures and Public Key Infrastructure
4.4.4.4. FootprintingFootprintingFootprintingFootprinting
4.1 Information Gathering
4.2 DNS, whois and ARIN records
4.3 Using traceroute, e-mail tracking and web spider
4.4 Google Hacking
5.5.5.5. Social EngineeringSocial EngineeringSocial EngineeringSocial Engineering
5.1 Social Engineering Concepts
5.2 Social Engineering Attack Types
5.3 Countermeasures for Social Engineering
6.6.6.6. Physical SecurityPhysical SecurityPhysical SecurityPhysical Security
6.1 Basics and Need
6.2 Physical Security Countermeasures
7.7.7.7. Network Scanning and EnumerationNetwork Scanning and EnumerationNetwork Scanning and EnumerationNetwork Scanning and Enumeration
7.1 Network Scanning Techniques
7.2 Scanners and Analyzers
Certified Ethical Hacking and Security Professional
www.vskills.in
7.3 HTTP tunneling and IP spoofing
7.4 Enumerating null sessions and SNMP enumeration
8.8.8.8. Network AttacksNetwork AttacksNetwork AttacksNetwork Attacks
8.1 TCP/IP Packet Formats and Ports
8.2 Firewall and IDS
8.3 Switch Attacks
8.4 Router Attacks
8.5 DoS, DDoS, Session Hijacking
9.9.9.9. Wireless NetworksWireless NetworksWireless NetworksWireless Networks
9.1 Wireless LAN Basics
9.2 WLAN Security
9.3 WLAN Attacks
9.4 WLAN Attack Countermeasures
10.10.10.10. System HackingSystem HackingSystem HackingSystem Hacking
10.1 Password Attacks, Vulnerabilities and Countermeasure
10.2 Spyware
10.3 Rootkit
10.4 Steganography
10.5 Trojans
10.6 Computer worm
10.7 Backdoor
10.8 Buffer Overflow
11.11.11.11. Windows HackingWindows HackingWindows HackingWindows Hacking
11.1 Memory and Process
11.2 Windows Architecture
11.3 Windows Security
11.4 Windows Attacks
11.5 Countermeasures
11.6 Windows Memory Protection, SEH and OllyDbg
12.12.12.12. Linux HackingLinux HackingLinux HackingLinux Hacking
12.1 Linux Basics
12.2 Linux Threats
12.3 Linux Security
12.4 Kernel Patching
13.13.13.13. Web HackingWeb HackingWeb HackingWeb Hacking
13.1 Web Basics
13.2 Web Server Attacks
13.3 Web Application Attacks
13.4 VoIP Attacks
Certified Ethical Hacking and Security Professional
www.vskills.in
14.14.14.14. Emerging TrendsEmerging TrendsEmerging TrendsEmerging Trends
14.1 Cloud Computing and Security
14.2 Identity Access Management
14.3 Security Policies
14.4 Mobile Security
14.5 New Threats
Certified Ethical Hacking and Security Professional
www.vskills.in
Sample QuestionsSample QuestionsSample QuestionsSample Questions
1.1.1.1. TheTheTheThe term DDoS expands toterm DDoS expands toterm DDoS expands toterm DDoS expands to _______._______._______._______.
A. Divisive Denial of Service
B. Distributed Denial of Service
C. Detailed Denial of Service
D. None of the above
2222. The. The. The. The software Metasploit is used for _______.software Metasploit is used for _______.software Metasploit is used for _______.software Metasploit is used for _______.
A. Anti-virus
B. Vulnerability Assessment
C. Anti-malware
D. None of the above
3333. The. The. The. The term XSS refers toterm XSS refers toterm XSS refers toterm XSS refers to _______._______._______._______.
A. eXtended Site Scripting
B. eXtreme Secured Services
C. Cross site scripting
D. None of the above
4444. The. The. The. The tool OllDbg is used for analyzing code for which operating system _______.tool OllDbg is used for analyzing code for which operating system _______.tool OllDbg is used for analyzing code for which operating system _______.tool OllDbg is used for analyzing code for which operating system _______.
A. Microsoft Windows
B. Linux
C. Macintosh
D. None of the above
5555. The. The. The. The operating system back track is used foroperating system back track is used foroperating system back track is used foroperating system back track is used for _______._______._______._______.
A. Penetration testing
B. Virus scanning and removal
C. Malware scanning and removal
D. None of the above
Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)
Ethical Hacking and Security Certification

More Related Content

Viewers also liked

Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 

Viewers also liked (9)

Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Network Security
Network SecurityNetwork Security
Network Security
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

More from Vskills

Vskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills
 
vskills customer service professional sample material
vskills customer service professional sample materialvskills customer service professional sample material
vskills customer service professional sample materialVskills
 
Vskills certified operations manager sample material
Vskills certified operations manager sample materialVskills certified operations manager sample material
Vskills certified operations manager sample materialVskills
 
Vskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills
 
Vskills production and operations management sample material
Vskills production and operations management sample materialVskills production and operations management sample material
Vskills production and operations management sample materialVskills
 
vskills leadership skills professional sample material
vskills leadership skills professional sample materialvskills leadership skills professional sample material
vskills leadership skills professional sample materialVskills
 
vskills facility management expert sample material
vskills facility management expert sample materialvskills facility management expert sample material
vskills facility management expert sample materialVskills
 
Vskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills
 
Vskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills
 
Vskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills
 
Vskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills
 
certificate in agile project management sample material
certificate in agile project management sample materialcertificate in agile project management sample material
certificate in agile project management sample materialVskills
 
Vskills angular js sample material
Vskills angular js sample materialVskills angular js sample material
Vskills angular js sample materialVskills
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample materialVskills
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample materialVskills
 
Vskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills
 
Vskills basel iii professional sample material
Vskills basel iii professional sample materialVskills basel iii professional sample material
Vskills basel iii professional sample materialVskills
 
Vskills telecom management professional sample material
Vskills telecom management professional sample materialVskills telecom management professional sample material
Vskills telecom management professional sample materialVskills
 
Vskills retail management professional sample material
Vskills retail management professional sample materialVskills retail management professional sample material
Vskills retail management professional sample materialVskills
 
Vskills contract law analyst sample material
Vskills contract law analyst sample materialVskills contract law analyst sample material
Vskills contract law analyst sample materialVskills
 

More from Vskills (20)

Vskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills certified administrative support professional sample material
Vskills certified administrative support professional sample material
 
vskills customer service professional sample material
vskills customer service professional sample materialvskills customer service professional sample material
vskills customer service professional sample material
 
Vskills certified operations manager sample material
Vskills certified operations manager sample materialVskills certified operations manager sample material
Vskills certified operations manager sample material
 
Vskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample material
 
Vskills production and operations management sample material
Vskills production and operations management sample materialVskills production and operations management sample material
Vskills production and operations management sample material
 
vskills leadership skills professional sample material
vskills leadership skills professional sample materialvskills leadership skills professional sample material
vskills leadership skills professional sample material
 
vskills facility management expert sample material
vskills facility management expert sample materialvskills facility management expert sample material
vskills facility management expert sample material
 
Vskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills international trade and forex professional sample material
Vskills international trade and forex professional sample material
 
Vskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills production planning and control professional sample material
Vskills production planning and control professional sample material
 
Vskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample material
 
Vskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample material
 
certificate in agile project management sample material
certificate in agile project management sample materialcertificate in agile project management sample material
certificate in agile project management sample material
 
Vskills angular js sample material
Vskills angular js sample materialVskills angular js sample material
Vskills angular js sample material
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Vskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills financial modelling professional sample material
Vskills financial modelling professional sample material
 
Vskills basel iii professional sample material
Vskills basel iii professional sample materialVskills basel iii professional sample material
Vskills basel iii professional sample material
 
Vskills telecom management professional sample material
Vskills telecom management professional sample materialVskills telecom management professional sample material
Vskills telecom management professional sample material
 
Vskills retail management professional sample material
Vskills retail management professional sample materialVskills retail management professional sample material
Vskills retail management professional sample material
 
Vskills contract law analyst sample material
Vskills contract law analyst sample materialVskills contract law analyst sample material
Vskills contract law analyst sample material
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Ethical Hacking and Security Certification

  • 1. Certified Ethical Hacking and Security Professional VS-1078
  • 2. Certified Ethical Hacking and Security Professional www.vskills.in CCCCertifiedertifiedertifiedertified Ethical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and Security ProfessionalProfessionalProfessionalProfessional Certification CodeCertification CodeCertification CodeCertification Code VS-1078 Vskills certification for Ethical Hacking and Security Professional assesses the candidate for testing and managing company’s information security. The certification tests the candidates on various areas in ethical hacking and security which includes knowledge of ethics and countermeasures for attacks on system, network (wired and wireless), operating system (Windows and Linux) and web based attacks. Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification? This Course is intended for professionals and graduates wanting to excel in their chosen areas. It is also well suited for those who are already working and would like to take certification for further career progression. Earning Vskills Ethical Hacking and Security Professional Certification can help candidate differentiate in today's competitive job market, broaden their employment opportunities by displaying their advanced skills, and result in higher earning potential. Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification? Job seekers looking to find employment in IT or information security department of various companies, students generally wanting to improve their skill set and make their CV stronger and existing employees looking for a better role can prove their employers the value of their skills through this certification Test DetailsTest DetailsTest DetailsTest Details • Duration:Duration:Duration:Duration: 60 minutes • No. of questions:No. of questions:No. of questions:No. of questions: 50 • Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%) There is no negative marking in this module. FFFFee Structureee Structureee Structureee Structure Rs. 4,500/- (Includes all taxes) CompaniesCompaniesCompaniesCompanies that hire Vskills Certifiedthat hire Vskills Certifiedthat hire Vskills Certifiedthat hire Vskills Certified Ethical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and SecurityEthical Hacking and Security ProfessionalProfessionalProfessionalProfessional Ethical Hacking and Security professionals are in great demand. Private and public companies are constantly hiring knowledgeable professionals for their testing and management of information security measures for a secured environment.
  • 3. Certified Ethical Hacking and Security Professional www.vskills.in Table of Contents 1.1.1.1. IntroductionIntroductionIntroductionIntroduction 1.1 Ethical Hacking Evolution and Hacktivism 1.2 Need and Technical Terms 1.3 Skills Needed and Stages of Hacking 1.4 Ethical Hacking Modes 1.5 Networking Basics 1.6 Penetration Testing 2.2.2.2. EthicsEthicsEthicsEthics 2.1 Moral Direction and Hacker Ethics Principles 2.2 Security Grey Areas 2.3 Cyber Laws (IT Act, etc.) 2.4 Rules of Engagement 3.3.3.3. CryptographyCryptographyCryptographyCryptography 3.1 Cryptography Basics 3.2 Evolution and Data Encryption Methods 3.3 Symmetric and Asymmetric key Cryptography 3.4 Private and Public Key Exchange 3.5 Stream and Block Ciphers 3.6 Secret Key Cryptography 3.7 Message Authentication and Hash Functions 3.8 Digital Signatures and Public Key Infrastructure 4.4.4.4. FootprintingFootprintingFootprintingFootprinting 4.1 Information Gathering 4.2 DNS, whois and ARIN records 4.3 Using traceroute, e-mail tracking and web spider 4.4 Google Hacking 5.5.5.5. Social EngineeringSocial EngineeringSocial EngineeringSocial Engineering 5.1 Social Engineering Concepts 5.2 Social Engineering Attack Types 5.3 Countermeasures for Social Engineering 6.6.6.6. Physical SecurityPhysical SecurityPhysical SecurityPhysical Security 6.1 Basics and Need 6.2 Physical Security Countermeasures 7.7.7.7. Network Scanning and EnumerationNetwork Scanning and EnumerationNetwork Scanning and EnumerationNetwork Scanning and Enumeration 7.1 Network Scanning Techniques 7.2 Scanners and Analyzers
  • 4. Certified Ethical Hacking and Security Professional www.vskills.in 7.3 HTTP tunneling and IP spoofing 7.4 Enumerating null sessions and SNMP enumeration 8.8.8.8. Network AttacksNetwork AttacksNetwork AttacksNetwork Attacks 8.1 TCP/IP Packet Formats and Ports 8.2 Firewall and IDS 8.3 Switch Attacks 8.4 Router Attacks 8.5 DoS, DDoS, Session Hijacking 9.9.9.9. Wireless NetworksWireless NetworksWireless NetworksWireless Networks 9.1 Wireless LAN Basics 9.2 WLAN Security 9.3 WLAN Attacks 9.4 WLAN Attack Countermeasures 10.10.10.10. System HackingSystem HackingSystem HackingSystem Hacking 10.1 Password Attacks, Vulnerabilities and Countermeasure 10.2 Spyware 10.3 Rootkit 10.4 Steganography 10.5 Trojans 10.6 Computer worm 10.7 Backdoor 10.8 Buffer Overflow 11.11.11.11. Windows HackingWindows HackingWindows HackingWindows Hacking 11.1 Memory and Process 11.2 Windows Architecture 11.3 Windows Security 11.4 Windows Attacks 11.5 Countermeasures 11.6 Windows Memory Protection, SEH and OllyDbg 12.12.12.12. Linux HackingLinux HackingLinux HackingLinux Hacking 12.1 Linux Basics 12.2 Linux Threats 12.3 Linux Security 12.4 Kernel Patching 13.13.13.13. Web HackingWeb HackingWeb HackingWeb Hacking 13.1 Web Basics 13.2 Web Server Attacks 13.3 Web Application Attacks 13.4 VoIP Attacks
  • 5. Certified Ethical Hacking and Security Professional www.vskills.in 14.14.14.14. Emerging TrendsEmerging TrendsEmerging TrendsEmerging Trends 14.1 Cloud Computing and Security 14.2 Identity Access Management 14.3 Security Policies 14.4 Mobile Security 14.5 New Threats
  • 6. Certified Ethical Hacking and Security Professional www.vskills.in Sample QuestionsSample QuestionsSample QuestionsSample Questions 1.1.1.1. TheTheTheThe term DDoS expands toterm DDoS expands toterm DDoS expands toterm DDoS expands to _______._______._______._______. A. Divisive Denial of Service B. Distributed Denial of Service C. Detailed Denial of Service D. None of the above 2222. The. The. The. The software Metasploit is used for _______.software Metasploit is used for _______.software Metasploit is used for _______.software Metasploit is used for _______. A. Anti-virus B. Vulnerability Assessment C. Anti-malware D. None of the above 3333. The. The. The. The term XSS refers toterm XSS refers toterm XSS refers toterm XSS refers to _______._______._______._______. A. eXtended Site Scripting B. eXtreme Secured Services C. Cross site scripting D. None of the above 4444. The. The. The. The tool OllDbg is used for analyzing code for which operating system _______.tool OllDbg is used for analyzing code for which operating system _______.tool OllDbg is used for analyzing code for which operating system _______.tool OllDbg is used for analyzing code for which operating system _______. A. Microsoft Windows B. Linux C. Macintosh D. None of the above 5555. The. The. The. The operating system back track is used foroperating system back track is used foroperating system back track is used foroperating system back track is used for _______._______._______._______. A. Penetration testing B. Virus scanning and removal C. Malware scanning and removal D. None of the above Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)