Certified Information Security Expert (CISE Level 1 v2) Detailed Course Module
Certified Information Security Expert (CISE Level 1 v2) Detailed Course Module
Certified Information Security Expert (CISE Level 1 v2) Detailed Course Module
The hands on security courses in the field of offensive security are built
by the Innobuzz Knowledge Solutions Pvt Ltd members to ensure real
world experience
www.innobuzz.in
Chapter 1 – Introduction
Concept of Security
Physical and Digital Assets
Security Triangle
Introduction: Ethical hacking
Types of Ethical Hackers
Basic Terminologies
Elements of Security
5 Phases of Hacking
Profile of an Ethical Hacker
Security Testing, Computer Crimes and Law
History of Hacking & Famous Hackers
Chapter 3 – Footprinting
Footprinting/Information Gathering
Steps of Information Gathering
Crawling and Mirroring of Websites
Whois and Domain Registry
Gathering Target Information
Parallel Domain
MX Entry
Trace Route
Archive Pages
Banner Grabbing
Chapter 4 – Google Hacking
Introduce Google
Working of Google – Outline
Working of Google – Crawling, Indexing & Searching
Vulnerable Objects
Using Cache and Google as Proxy
Directory Listing and Locating Directory Listings along with specific folders
Google Hacking and what it is about
The basics of Google Hacking: Advanced Search in Google
Advance Search Operators: site:, filetype:, inurl:, intitle:, cache:, info:
Wildcard and Quotes
Understanding and Viewing Robots.txt for important Files
Normal Countermeasures
o Robottxt
o Metatag and Google Official Remove
o Hiding Detailed Error Messages
o Disabling Directory Browsing
Chapter 5 – Scanning
Definition of Scanning
Types of Scanning
Diff b/w Port and Network Scanning
Objectives and Benefits of Scanning
TCP three way hands shake
Various Classification of Scanning
Fragments, UDP, ICMP, Reverse Ident, List & Idle, RPC, Window Scan, Ping Sweep
Concept of War Dialer (History)
OS Finger Printing and Types – Active & Passive
Chapter 12 – Sniffers
Concept of Sniffing
Types of Sniffing – Active & Passive
ARP Poisoning
Countermeasures of ARP Poisoning
DNS Spoofing
Changes in Host file for DNS Redirection
Countermeasures of sniffing
MAC Spoofing
Chapter 15 – Steganography
Steganography
o What is Steganography?
o History
o Steganography today
o Steganography tools
Steganalysis
o What is Steganalysis?
o Types of analysis
o Identification of Steganographic files
Steganalysis meets Cryptanalysis
o Password Guessing
o Cracking Steganography programs
Forensics/Anti-Forensics
Conclusions
o What’s in the Future?
o Other tools in the wild
o References
Chapter 16 – Cryptography
Concept of Cryptography
Advantages and uses of Cryptography
PKI (Public Key Infrastructure)
Algorithm’s of encryption – RSA, MD5, SHA, SSL, PGP, SSH, GAK
Concept of Digital Signature
Encryption Cracking Techniques
Disk Encryption
Cracking S/MIME encryption using idle CPU time
Concept of Command Line Scriptor and Crypto Heaven, Cyphercalc
CA (Certificate Authority)