CE|H-Certified Ethical Hacker |
1.Introduction to Ethical Hacking, 2. Footprinting and Reconnaissance, 3.Scanning Networks, 4. Enumeration, 5. Vulnerability Analysis, 6.System Hacking,
7. Malware Threats, 8. Sniffing, 9. Social Engineering, 10. Denial-of-Service, 11. Session Hijacking, 12. Evading IDS, Firewalls, and Honeypots,
13. Hacking Web Servers, 14. Hacking Web Applications, 15. SQL Injection, 16. Hacking Wireless Networks, 17. Hacking Mobile Platforms,
18. IoT Hacking, 19. Cloud Computing, 20. Cryptography |
CE|H Lab-Certified Ethical Hacker-Lab |
2. Footprinting and Reconnaissance, 3.Scanning Networks, 4. Enumeration, 5. Vulnerability Analysis, 6.System Hacking,
7. Malware Threats, 8. Sniffing, 9. Social Engineering, 10. Denial-of-Service, 11. Session Hijacking, 12. Evading IDS, Firewalls, and Honeypots,
13. Hacking Web Servers, 14. Hacking Web Applications, 15. SQL Injection, 16. Hacking Wireless Networks, 17. Hacking Mobile Platforms,
18. IoT Hacking, 19. Cloud Computing, 20. Cryptography |
CISA-Certified Information Systems Auditor |
Domain 1: Information System Auditing Process. Domain 2: Governance and Management of IT. Domain 3: Information Systems Acquisition, Development and Implementation.
Domain 4: IS Operations and Business Resilience. Domain 5: Information Asset Security and Control. |
CISSP-Certified Information System Security Professional |
Domain 1: Security and Risk Management. Domain 2: Asset Security. Domain 3: Security Architecture and Engineering.
Domain 4: Communications and Network Security. Domain 5: Identity and Access Management. Domain 6: Security Assessment and Testing.
Domain 7: Security Operations. Domain 8: Software Development Security.
|
CISM-Certified Information Security Manager |
Domain-1: Information Security Governance, Domain-2: Information Security Risk Management, Domain-3: Information Security Program,
Domain-4: Incident Management
|
OSCP-Offensive Security Certified Professional |
Penetration Testing: What You Should Know - Getting Comfortable with Kali Linux - Command Line Fun - Practical Tools - Bash Scripting -
Passive Information Gathering - Active Information Gathering - Vulnerability Scanning - Web Application Attacks - Introduction to Buffer Overflows
Windows Buffer Overflows - Linux Buffer Overflows - Client-Side Attacks - Locating Public Exploits - Fixing Exploits - File Transfers - Antivirus Evasion -
Privilege Escalation - Password Attacks - Port Redirection and Tunneling - Active Directory Attacks - The Metasploit Framework - PowerShell Empire -
Assembling the Pieces: Penetration Test Breakdown - Trying Harder: The Labs.
|