- Ethical Hacking(Cybersecurity)
-
Ethical Hacking (Cybersecurity) Course Syllabus:
Ethical Hacking
Module 1: Introduction
- Course Introduction
Module 2: Introduction to Ethical Hacking
- Fundamental Security Concepts
- Information Security Threats and Attacks
- Introduction to Ethical Hacking, Cyber Kill Chain, Security Controls and Security Laws and Standards
Module 3: Footprinting and Reconnaissance
- Introduction to Footprinting
- Website Footprinting
- DNS Footprinting
- HTTrack (Demo)
- Shodan (Demo)
- Google Hacking Database (Demo)
- LinkedIn (Demo)
- Job Boards (Demo)
- whois (Demo)
- Banner Grabbing (Demo)
- theHarvester (Demo)
- Footprinting Countermeasures
Module 4: Scanning and Enumeration
- Introduction to Network Scanning
- Ping Command (Demo)
- NMAP (Demo)
- Hping3 (Demo)
- Introduction to Enumeration
- Enumeration Countermeasures
- SMB Enumeration (Demo)
- NetBIOS Enumeration (Demo)
- DNS Enumeration (Demo)
Module 5: System Hacking
- Introduction to Vulnerabilities
- Vulnerability Assessment Phases and Tools
- Types of Password Attacks and Defenses
- Password Cracking with Medusa (Demo)
- Privilege Escalation
- Malware: Keyloggers, Rootkits, Trojans
- Malware: Introduction to Viruses, its , Worms
- Detecting Malware
- Malware Countermeasures
Module 6: Network and Perimeter Hacking
- Introduction to Sniffing
- Sniffing Attacks, Tools, Countermeasures
- Introduction to Social Engineering
- Social Engineering Countermeasures
- Introduction to DoS and its Attacks
- Types of DoS and its Attacks
- DDoS Tools and Countermeasures
- 0Introduction to Session Hijacking
- Network Level Session Hijacking
- IDS and Firewall Evasion Techniques
- WAF Detection with WAFW00F (Demo)
- Gaining Remote Access (Demo)
Module 7: Web Application Hacking
- Web Server Attack Methodology
- Types of Web Server Attacks and Countermeasures
- Web Application Threats
- Web Application Hacking Methodology
- Introduction to SQL Injection Attacks
- Command Injection Attack (Demo)
- Web Attack Countermeasures
Module 8: Wireless Network Hacking
- Introduction to Wireless
- Wireless Attacks and Countermeasures
- Module 9: Mobile Hacking
- WASP Top 10 for Mobile
- Mobile Attacks and Countermeasures
Module 9: IoT and OT Hacking
- Introduction to IoT Hacking
- Communication Models and Operating Systems
- Attacks and Threats
- Attack Countermeasures
- Concepts
- Attacks and Countermeasures
Module 10: Cloud Computing
- Introduction to Cloud Environments
- Cloud Computing Services
- Benefits of Cloud Computing
- Cloud Threats and Attacks
- Cloud Security Considerations
Module 11: Cryptography
- Introduction to Cryptography
- Hashing, Digital Certificates and Digital Signatures
- Cryptography Attacks and Countermeasures
Similar Courses
- Flutter Mobile App Dev
- ASP C SHARP DOT NET
- ASP C# DOT NET
- Database Development
- Basic & Advance Excel
- Data Science
- ArcGIS
- React Js
- Ethical Hacking(Cybersecurity)
- SW ROAD V2 TRAINING
- Basics of Programming
- Digital Marketing
- AutoCad
- CCNA Networking
- DataBase (SQL/NoSQL)
- Quality Assurance
- Graphics Design
- Web Design
- Javascript
- MERN Stack
- MEAN Stack
- C++ Programming
- C Programming
- ASP C# .Net + MSSQL
- PHP + Laravel +MySQL
- Android (Mobile App Development)
- Python + Artificial Intelligence
- Python + Django
- Java + Spring Training
- PHP with Laravel
- CodeIgniter Training
- Zend Framework Training
- Web Development with Laravel Training
- Advanced PHP Training
- Yii PHP Training
- PHP Training
- Civil Eng.Courses
- Designing Courses
- IT Courses