- Introduction
- Notekeeping
- Effective Note keeping
- Important tools
- Case study 1
- Cognizant Technology Solutions Corp
- Basics of Networking
- Basics of Web, Server, APIs & Apps
- Setting up labs
- Introduction to Linux & commands
- Introduction to Python [optional]
- Hackers Methodology [Phases of hacking]
- Information Gathering & Recon
- Scanning & Enumeration
- Additional Scanning tools
- Intro to Masscan, Metasploit, Nessus
- Basics of Exploitation
- Shells & Reverse shells
- Bruteforce attacks
- Root access in metasploit
- Staged vs Non-Staged Payloads
- Password spraying, Credentials stuffing
- Mid-Course Capstone [Important walkthroughs]
- Case study 2
- Introduction to Exploit development
- Active Directory Overview
- Active directory lab build
- Active directory Initial attack vectors and post-compromise enumeration
- Active directory Post compromise attacks
- Post exploitation
- WEB APPLICATION ENUMERATION
- TESTING OWASP TOP 10 WEB VULNERABILITIES
- Wireless Pentesting
- Legal Documents, Report Writing and method to work on industry Projects
At the end of this course, you will be able to understand how high-level attacks happen, how these attacks are facilitated, and how you could carry out these attacks ethically. You will also understand, how to respond in case of an emergency attack and mitigate different threats. KINDLY UNDERSTAND, THIS COURSE IS FOR EDUCATIONAL PURPOSES ONLY.