Ethical Hacking
By – Vivek Kumar
- Networking
- Introduction to Networking
- Types of Networking
- Introduce Network Devices ( Hub, Switch, Repeater, etc.)
- Introduction to Cables
- What is LAN Basic
- What is Topology
- Network Protocol
- IP Addressing
- Remote Access
- Ethical Hacking
- Introduction to Linux
- Basic commands in Linux
- File commands in Linux
- Folder Commands in Linux
- Linux Permissions
- Introduction to Operating system
- Types of Hacker
- Types of Attacks
- Cyber Laws
- Introduction to Footprinting
- Eavesdropping Attack
èIntroduction to Scanning
- Introduction to Nmap
- Common Nmap Commands
- ARP Spoofing
- IP Spoofing
- Mac Flooding
- DNS Enumeration
èIntroduction to User identifications
- Anonymous Browsing
- VPN
- IP Proxy
- Add-ons for Web Browser
- TOR Browser
- MAC Spoofing
- Introduction to Steganography
- Email Steganography
- Audio Steganography
è Hacking and Emails
- Basics of Emails
- Email vulnerabilities
- Email Protocols
- Email spoofing
- Email Spamming
- Email Harvesting
- Email Headers
è Hacking & Malware
- Introduction to Malware
- Types of Malware
- Introduction to Virus
- Trojans
- Creating Bat files
è Anonymous & Steganography
- Introduction to Steganography
- Image Steganography
- Audio Steganography
- Email Steganography
è Hacking & Password Cracking
- Introduction to Password Cracking
- Password Cracking techniques
- Dictionary Attacks – Brute force
- Linux tools for Password Cracking
- Computer Lock Screen Password Breaking
è Hacking & Phishing
- Introduction to Phishing
- Phishing techniques
- Phishing attacks tools
è Denial of Services
- Introduction of DOS & DDOS Attacks
- Buffer Overflow
- Botnet Attack
è Website Hacking
- Introduction to Website Hacking
- Google Dorking
- Hacking Admin panel on Websites
- Introduction to Burpsuite
- Vulnerability Assessment
- SQL injection attack
- Blind SQL attack
è Mobile Hacking
- Introduction to Mobile Hacking
- Hacking Mobile Devices
è Reporting Cyber Crimes
- Introduction to Cyber Crime
- The 418 Scam
è Cyber Laws
- Introduction to Cyber Laws
- Cyber Laws
- Cyber Crime Portals
- ITA 2000 & 2008
è Interview Questions