Ethical Hacking & Information Security Course Overview
1.Introduction to Cyber Security
- Overview of Cyber Security
- Hackers Vs Ethical Hackers
- Different Types Of Hackers
- World Top Hacker’s History
- Terminologies used in Hacking
- Malicious hacker phases
- Requirments To Become a Hacker
2. Careers In Cyber Security
- Why is Cyber Security essential?
- Different Fields in Cyber Security
- Certifications and Importance
- Short& Long Term courses Available
- Need of Cyber Security Experts
3. The concept of Virtualization.
- Taking Snapshot
- Running Multiple Platforms.
- Backend Settings Changing.
3.1 Kali Linux Terminology
- Kali Linux Installation and Configuration
- ISO Customizations
- Different Desktop environments
- Security and Package update
4. Information Gathering
- What is Information Gathering
- Active& Passive Information Gathering
- Dnsdict6
- Dnsenum
- Dnsmap
- Dnsrecon
- Dnsrevenum6
- Dnsrevenum6
- Dnswalk
- Fierce
- Maltego
- Nmap
- Zenmap
- Urlcrazy
- Miranda
- Knock
- Knock
5. Google as an Information Gathering Agent
- Google and Its Working
- Dork For Google Hacking
- inurl
- intitle
- filetype
- site
- cache
- shtml
- define
- Info etc
6. Tools For Google Hacking
7. Web Crawling Tools
8. Web-based Footprinting
- BlogPulse
- Pipl
- Spy
9. Sites For Footprinting
- Netcraft
- Yougetsignal
- Spiderfoot
- Dnsstuff
- MxToolbox
- Backstreet Browser
10. Basics of Networking Concepts
- What is Network?
- Types of Network
- Network Topologies
- Networking Devices
- What are IP Addresses?
- Types of IP Addresses.
- What are MAC Addresses?
- ISO/OSI Layers DEFINITION
- Network configuration management
11. Scanning and Enumerations
- Overview of TCP/IP 3 way Handshake
- Stealth scans
- Nmap scanning methods
- NmapRealworld scans
- Nmap Script Engine
- Evading firewall/ IDS
- Firewall scanning using HPING3
- Online Scanning
- Some useful scanners
- Autoscan, Superscan, Unicornscan
- Introduction to Enumeration
- SNMP Enumeration
- Banner grabbing
12. Hiding Identity
- Online Proxy
- Proxy Tools
- Mac spoof
- Tab, Browser, System, Network Based Proxy
- VPNs
- Bypass Restrictions Using Proxy and VPNs
13. Social Engineering Toolkit
- What is Social Engineering
- Types of Social Engineering
- The spear-phishing attack vectors
- The spear-phishing attack vectors
- Infectious Media Generator
- SMS Spoofing Attack Vector
- QRcode Generator Attack Vector
- How to Perform Social Engineering Attack
- Prevention against Social Engineering
14. Advance Metasploit Exploitation
- Metasploit Framework
- Metasploit Interfaces
- Payloads
- Shellcode Database
15. Post Exploitation
- Pivoting
- Privilege Escalation
16. Sniffing
- Wireshark
- NetworkMiner
- Cain and Abel
- Ettercap
17. System Hacking
- Password Cracking
- Password Resetting
- Login Without Entering Password
- Password In Plain Text
- Backdoor Installation
- Securing System
18. Virus, Trojan, and Keyloggers
- Hacking Using Trojans and Others Malware
- Binding Trojans
- Bypassing Anti viruses
- Rootkits
- Botnets
19. Data Hiding
- Introduction to Stenography
- Introduction to Cryptography
- Data Hiding Behind Images, Videos Files Etc
- Data Hiding Tools
- Cryptography
- Use of cryptography in Data Hiding
- Hashing
- Common Hash Algorithms
- Generic Hash Demo
- Security Issues in Hashing
- SSL/TLS & Connection Setup
20. Wireless Hacking
- WEP Cracking
- WPA/WPA2 Password Cracking
- WI-FI Router Password Cracking
- Wireless Security Measures
21. Mobile Hacking
- Call Spoofing
- Fake SMS
22. Honeypots
- IDS& IPS
- Installation, Configuration & Maintenance
- Honeypots
- Types Of Honeypots
- Implementation of Honeypots
- Firewall Types
- Packet Filtering Firewall Types
- Proxy Firewalls Firewall Types
- Circuit-Level Proxy Firewall
- Stateful Multi inspection Firewall
23. Buffer Overflow, DOS, and DDOS
- Buffer Overflows
- Hping
- Slowris
- LOIC
- More Dos concepts (dhcp ,mac flooding,dns spoof , telling about CIA triad loss)
24. Reverse Engineering
- Introduction
- Assembly Language basics
- Identifying flaws
- Debuggers
- Bypassing and Cracking
- Counter measures
25. Pentest Methodology
- Description of different pen Testing Methodologies
- Open Source Security Testing Methodology Manual (OSSTMM)
- Information Systems Security Assessment Framework (ISSAF)
- Open Web Application Security Project (OWASP) Top Ten
- Web Application Security Consortium Threat Classification (WASC-TC)
- PCI-DSS
26. Addons and Tool Based Footprinting
- Hackbar
- Tamper Data
- DOM Inspector
- HTTP Live Header
- Fire Bug
27. Website Hacking
- Bypass Authentication
- Google as Vulnerability Scanner
- Manual& Automatic SQL Injection
- Sqlmap
- Sqlninja
- Sqli
- Cross Site Scripting
- Dumping Passwords
- Countermeasures
28. VA-PT
- Introduction to VA-PT
- Key Benefits & Difference
- Closed Source VA-PT
- Open source VA-PT
- Open source VA-PT
- Manual VA-PT
29. Disaster Recovery
- Introduction to Disaster Recovery and Business Continuity
- Types of Disasters
- Data disasters
- Virus disasters
- Software Disasters
- IT Staff Member Disasters
- Disaster Recovery at Home
- Introduction to Non-IT Disasters
30. Computer Forensics
- Introduction to Computer Forensics
- Computer Crimes and Criminals
- Collecting and Preserving Digital Evidence
- Building a Cybercrime Case
- Computer Hardware
- Computer Software
- Preserving and Recovering Digital Evidence