Course curriculum
-
1
Cyber Security-Ethical Hacking_E-Learning Content
-
Chapter 1 - Introduction to Ethical Hacking - 1
-
Introduction to Ethical Hacking - 2
-
Introduction to Ethical Hacking - 3
-
Chapter 2 - Introduction to Kali Linux and Linux Commands
-
Chapter 3 - Information Gathering / Foot Printing - Passive Information Gathering
-
Google Hacking
-
Dirb
-
Chapter 4 - Scanning
-
Mastering Nmap Tool - Sync-Scanning
-
Ack Scanning
-
Fin scanning
-
X-mas scanning
-
Fast Scanning
-
Aggressive scanning
-
TCP Scanning
-
UDP Scanning
-
Zenmap Scanning
-
Chapter 5 - Tools Introduction & Usage - OWASP ZAP Tool
-
Burp Suite - Introduction to Burp Suite
-
Burp Suite Setup
-
Dashboard Tab
-
Target Tab
-
Proxy Tab
-
Intruder Attack Types
-
Intruder Payload
-
Authentication Bypass - Example
-
Repeater Tab
-
Sequencer Tab
-
Decoder
-
Comparer
-
Extender
-
Burp Suite SQL - Example
-
Burp Suite - Final scan
-
Engagement Tools CSRF PoC
-
Nessus - Tool
-
Chapter 6 - Proxies & VPN's
-
Chapter 7 - Dark Web & Deep Web
-
Chapter 8 - Social Engineering - 1
-
Social Engineering - 2
-
Chapter 9 - Malware Threats - Malware
-
Viruses
-
Trojan
-
IDS & IPS
-
Chapter 10 - Sniffing - Sniffing using Wireshark
-
Chapter 11 - Session Hijacking
-
Chapter 12 - SQL Injection - Introduction to SQL
-
SQL Map
-
SQL Injection - 1
-
SQL Injection - 2
-
Chapter 13 - Cryptography - Cryptography Concept
-
Algorithms
-
Symmetric Algorithms
-
Public Key Encryption
-
Private Key Encryption
-
Hashing and Digital Signatures
-
Digital Certificates
-
-
2
Cyber Security/Ethical Hacking - Scanning using OWASP ZAP from Threat Prism_Project - 1
-
Scanning using OWASP ZAP
-
-
3
Cyber Security/Ethical Hacking - Scanning for Open ports and Attacking them from Threat Prism_Project - 2
-
Challenge 1 - Nmap Scanning-Sync Scanning
-
Ack Scanning
-
Fin scanning
-
X-mas scanning
-
Fast Scanning
-
Aggressive scanning
-
TCP Scanning
-
UDP Scanning
-
Challenge 2 - Enumerate Users
-
Challenge 3 - Exploitation-Version Exploitation - 1
-
Version Exploitation - 2
-