• Ethical Hacking(Cybersecurity)

Ethical Hacking (Cybersecurity) Course Syllabus:

Ethical Hacking

Module 1: Introduction

  • Course Introduction

 

Module 2: Introduction to Ethical Hacking

  • Fundamental Security Concepts
  • Information Security Threats and Attacks
  • Introduction to Ethical Hacking, Cyber Kill Chain, Security Controls and Security Laws and Standards

 

Module 3: Footprinting and Reconnaissance

  • Introduction to Footprinting
  • Website Footprinting
  • DNS Footprinting
  • HTTrack (Demo)
  • Shodan (Demo)
  • Google Hacking Database (Demo)
  • LinkedIn (Demo)
  • Job Boards (Demo)
  • whois (Demo)
  • Banner Grabbing (Demo)
  • theHarvester (Demo)
  • Footprinting Countermeasures

 

Module 4: Scanning and Enumeration

  • Introduction to Network Scanning
  • Ping Command (Demo)
  • NMAP (Demo)
  • Hping3 (Demo)
  • Introduction to Enumeration
  • Enumeration Countermeasures
  • SMB Enumeration (Demo)
  • NetBIOS Enumeration (Demo)
  • DNS Enumeration (Demo)

 

Module 5: System Hacking

  • Introduction to Vulnerabilities
  • Vulnerability Assessment Phases and Tools
  • Types of Password Attacks and Defenses
  • Password Cracking with Medusa (Demo)
  • Privilege Escalation
  • Malware: Keyloggers, Rootkits, Trojans
  • Malware: Introduction to Viruses, its , Worms
  • Detecting Malware
  • Malware Countermeasures

 

Module 6: Network and Perimeter Hacking

  • Introduction to Sniffing
  • Sniffing Attacks, Tools, Countermeasures
  • Introduction to Social Engineering
  • Social Engineering Countermeasures
  • Introduction to DoS and its Attacks
  • Types of DoS and its Attacks
  • DDoS Tools and Countermeasures
  • 0Introduction to Session Hijacking
  • Network Level Session Hijacking
  • IDS and Firewall Evasion Techniques
  • WAF Detection with WAFW00F (Demo)
  • Gaining Remote Access (Demo)

 

Module 7: Web Application Hacking

  • Web Server Attack Methodology
  • Types of Web Server Attacks and Countermeasures
  • Web Application Threats
  • Web Application Hacking Methodology
  • Introduction to SQL Injection Attacks
  • Command Injection Attack (Demo)
  • Web Attack Countermeasures

 

Module 8: Wireless Network Hacking

  • Introduction to Wireless
  • Wireless Attacks and Countermeasures
  • Module 9: Mobile Hacking
  • WASP Top 10 for Mobile
  • Mobile Attacks and Countermeasures

 

Module 9: IoT and OT Hacking

  • Introduction to IoT Hacking
  • Communication Models and Operating Systems
  • Attacks and Threats
  • Attack Countermeasures
  • Concepts
  • Attacks and Countermeasures

 

Module 10: Cloud Computing

  • Introduction to Cloud Environments
  • Cloud Computing Services
  • Benefits of Cloud Computing
  • Cloud Threats and Attacks
  • Cloud Security Considerations

 

Module 11: Cryptography

  • Introduction to Cryptography
  • Hashing, Digital Certificates and Digital Signatures
  • Cryptography Attacks and Countermeasures