By Hamza HAsnain
Ethical hacking means to use
your hacking skills to try to find weaknesses and security holes in a system,
the results of which can be later used to fix those problems and close the
security holes which will ultimately lead to a more secure and robust system.
Please understand that ethical hacking doesn’t mean your usual social networking
hacking and some simple hacking tricks, it is a very broad field, involving many
subjects and genres.
Learning ethical hacking can be sometimes time consuming and difficult, as the beginners may get confused and overwhelmed by the amount of information online. Many times the beginners without any proper guidance may try to directly learn advanced things without any prior knowledge of the basics and the fundamentals. I get daily queries about from where to start learning about hacking and which ebooks and sources to refer. I usually don’t answer the queries because ethical hacking is a vast subject and it is difficult to predict in which type of hacking the leaner has interest in. So I would recommend first to understand about the field of ethical hacking and decide whether you are really interested in it.
Now to learn and get basic ideas about ethical hacking, I would suggest you to take same basic ethical hacking course. One such institution providing such course is Innobuzz. If you are an engineering student, I think you may be familiar with the name, they regularly conduct seminars and training programs in colleges. I did not attend one, some of my friends and cousin attended it. Later when I asked about it they said they where happy with innobuzz and that it was a good experience for the beginners who have no or very little idea about what ethical hacking really is.
Innobuzz
Innobuzz is a delhi-based institution which provides training courses in ethical hacking and information security. According to their site they have good industry tie-ups and have strong presence in the information security industry. They offer both physical and distance learning courses.
The distance learning course is a viable option for the beginners who may not be able to attend the physical classes. The distance learning course has no time limit but it is expected from the learner to finish it in roughly one month after which he can give the online certification exam. If you pass it you will be awarded their CISE Level 1 v2.0 (Certified Information Security Expert) certification. The certification is offered by Innobuzz and it can be a very useful certification in your Resume.
The distance learning course requires no prior knowledge of hacking and information security, you just need to have a basic knowledge of computer and networking. Here is some information about the course
Program
Highlights
- The premier certification in Information Security.
- Covers both sides of the coin - hacking and security.
- Hands on Training Program with over 150 Practicals covered with Live Demonstration.
- Covers latest Techniques and Practices in the industry along with CASE STUDIES.
- Created by leading security professionals from IIT Delhi and JHU, Maryland.
- Assignments and Research Projects given at the end of each Day.
- Industry endorsed Training Program, Training methodology and Certification.
CISE Level 1 v2.0 Training Module
- Chapter 1 – Introduction
- Chapter 2 - Networking & Basics
- Chapter 3 - Footprinting
- Chapter 4 - Google Hacking
- Chapter 5 - Scanning
- Chapter 6 - Windows Hacking
- Chapter 7 - Linux Hacking
- Chapter 8 - Trojans & Backdoors
- Chapter 9 - Virus & Worms
- Chapter 10 - Proxy Server & Packet Filtering
- Chapter 11 - Denial of Service
- Chapter 12 - Sniffer
- Chapter 13 - Social Engineering
- Chapter 14 - Physical Security
- Chapter 15 - Steganography
- Chapter 16 - Cryptography
- Chapter 17 - Wireless Hacking
- Chapter 18 - Firewall & Honeypots
- Chapter 19 - IDS & IPS
- Chapter 20 - Vulnerability Assessment
- Chapter 21 - Penetration Testing
- Chapter 22 - Session Hijacking
- Chapter 23 - Hacking Web Servers
- Chapter 24 - SQL Injection
- Chapter 25 - Cross Site Scripting
- Chapter 26 - Exploit Writing
- Chapter 27 - Buffer Overflow
- Chapter 28 - Reverse Engineering
- Chapter 29 - Email Hacking
- Chapter 30 - Incident Handling & Response
- Chapter 31 - Bluetooth Hacking
- Chapter 32 - Mobile Phone Hacking
0 comments:
Post a Comment