Ethical Hacking
1. Networking Concepts and Operating System
- Introduction to network
- How does the internet work?
- What is addressing?
- What is MAC?
- What are cookie and cache?
- Domain Name System
- Introduction to Operating System
- Types of operating Systems
- Understanding of windows
- Understanding of tokens
- Impersonation of tokens
- TCP/IP
- DHCP
2. Cyber Security and Cryptography
- What is Cyber Security
- Need of Cyber Security
- CIA Triangle
- Vulnerability, threat and risk
- What is cryptography?
- Classification of cryptography
- How cryptographic algorithm works?
- RSA algorithm example
- Cryptography tools
- Cryptography attacks
3. Cyber Threats
- Common cyber threats and ways to avoid them
- How the threat works?
- How to protect yourself?
4. Introduction to Ethical Hacking
- What is Ethical Hacking
- Types of hacker
- Who is a hacker
- Security challenges
- Vulnerability scanning
- Skills required for ethical hacker
- Types of attack
- Effects of hacking
- Penetration testing
5. Footprinting
- Footprinting terminologies
- What is Footprinting
- Methods of Footprinting
- Benefits of Footprinting
- Wayback machine
- Netcraft.com
- Traceroute
6. Hacking using Google
- What does a hacker does using Google hacking
- Footprinting using the Google hacking technique
- Google advance search operators
7. Steganography
- What is steganography?
- How does it work?
- Types of steganography
- Methods of steganography
8. Ethical hacking using Kali Linux
- Introduction
- Installation
- Basic commands
- Introduction of various tools and effective handling
- Proxy chain
- Macchange
9. NMAP
- Introduction
- Installation
- Network scanning using commands
- Reading of Nmap reports
10. Attacks
- XSS: Types and how to perform
- SQL Injection: Types and how to perform
- DDOS
5. Miscellaneous
- Parrot Operating System
- Session related attacks
- CSRF attack
- Metasploit
- Wireless pen-testing
- Windows subsystem for Linux
- Intrusion Detection system
- Intrusion Prevention system
- Transport Layer Security and Secure Socket Layer
12. Ethical Hacker Roadmap
The curriculum is empty