TopITacademy

TOPITACADEMY
Ethical Hacking
User Avatar By admin
Cyber Security

Ethical Hacking

  • 0

    (0)
  • meta-icon 0 Lessons
  • meta-icon 0 Students
User Avatar

Ethical Hacking

12 Weeks
Expert
0 lessons
0 quizzes
0 students

Ethical Hacking

1. Networking Concepts and Operating System

  • Introduction to network
  • How does the internet work?
  • What is addressing?
  • What is MAC?
  • What are cookie and cache?
  • Domain Name System
  • Introduction to Operating System
  • Types of operating Systems
  • Understanding of windows
  • Understanding of tokens
  • Impersonation of tokens
  • TCP/IP
  • DHCP

2. Cyber Security and Cryptography

  • What is Cyber Security
  • Need of Cyber Security
  • CIA Triangle
  • Vulnerability, threat and risk
  • What is cryptography?
  • Classification of cryptography
  • How cryptographic algorithm works?
  • RSA algorithm example
  • Cryptography tools
  • Cryptography attacks

3. Cyber Threats

  • Common cyber threats and ways to avoid them
  • How the threat works?
  • How to protect yourself?

 

4. Introduction to Ethical Hacking

  • What is Ethical Hacking
  • Types of hacker
  • Who is a hacker
  • Security challenges
  • Vulnerability scanning
  • Skills required for ethical hacker
  • Types of attack
  • Effects of hacking
  • Penetration testing

 

5. Footprinting

  • Footprinting terminologies
  • What is Footprinting
  • Methods of Footprinting
  • Benefits of Footprinting
  • Wayback machine
  • Netcraft.com
  • Traceroute

 

6. Hacking using Google

  • What does a hacker does using Google hacking
  • Footprinting using the Google hacking technique
  • Google advance search operators

 

7. Steganography

  • What is steganography?
  • How does it work?
  • Types of steganography
  • Methods of steganography

8. Ethical hacking using Kali Linux

  • Introduction
  • Installation
  • Basic commands
  • Introduction of various tools and effective handling
  • Proxy chain
  • Macchange

9. NMAP

  • Introduction
  • Installation
  • Network scanning using commands
  • Reading of Nmap reports

 

10. Attacks

  • XSS: Types and how to perform
  • SQL Injection: Types and how to perform
  • DDOS

 

5. Miscellaneous

  • Parrot Operating System
  • Session related attacks
  • CSRF attack
  • Metasploit
  • Wireless pen-testing
  • Windows subsystem for Linux
  • Intrusion Detection system
  • Intrusion Prevention system
  • Transport Layer Security and Secure Socket Layer

 

12. Ethical Hacker Roadmap

 

Write a comment

Your email address will not be published. Required fields are marked *

Free

  • 0
  • 0
  • 0 students
  • 12 weeks
  • Expert
  • English
Share Now :
[forminator_form id="7879"]

This will close in 20 seconds