Course Curriculum :
Introduction
- [1.1] Introduction to Information Security
- [1.2] Information-Security-Threats
- [1.3] Introduction to Cyber Security
- [1.4] The CIA Triad
- [1.5] Who are Hackers
- [1.6] Types of Hackers
- [1.7] Introduction to Ethical Hacking
- [1.8] Information Warfare
- [1.9] Need for Ethical Hackers
- [1.10] Careers in Ethical Hacking
- [1.11] Course Overview
- [1.12] General Terminologies
- [1.13] How To become an Ethical Hacker
- Module 1 Study Materials
Basics and Environment setup
- [2.1] Advantages and Limitations of Cyber Security
- [2.2] Cyber Defense
- [2.3] Skills of an Ethical Hacker
- [2.4] Information Security Policies
- [2.5] Vulnerability Research
- [2.6] Introduction to OS Linux and it’s Evolution
- [2.7] Major Linux Distributions
- [2.8] Advantages of linux
- [2.9] Linux for Penetration Testing
- [2.10] Types of Hackers contd
- [2.11] Phases of Ethical Hacking
- [2.12] Introduction to Penetration Testing
- [2.13] Phases of Penetration Testing
- [2.14] Cyber Security vs Ethical Hacking
- [2.15] Ethical Hacking Laws and Policies
- [2.16] IT Act 2000
- [2.17] Risk Management and Methodology
- [2.18] Software and Hardware Requirements for a Hacking Lab
- [2.19] Installing and Configuring VMWare WS
- [2.20] Dual boot vs Virtual Machine
- [2.21] Choosing and Downloading Kali Distro
- [2.22] Configuring VM For Kali Linux
- [2.23] Installing Kali Linux 2019.4 on VMWare (New)
- [2.24] Virtual Network Configurations Explained – NAT vs Bridged vs Host Only vs Internal
- [2.25] Installing and Configuring DVWA
- [2.26] Installing and Configuring bWAPP
- [2.27] Installing Metasploitable on VM
- [2.28] Installing OWASP Broken Web Application on VMWare
- Module 2 Study Materials
Linux Refresher
- [3.1] Introduction to Command Line
- [3.2] Windows command line
- [3.3] Linux command line
- [3.4] Linux File System
- [3.5] NTFS vs FAT vs EXT
- [3.6] Linux User Administration
- [3.7] Basic DOS Commands
- [3.8] DOS Networking Commands
- [3.9] Kali 2019.4 and Linux file system overview
- [3.10] Linux Elementary Commands
- [3.11] Linux Networking Commands
- [3.12] history and grep command
- [3.13] Working with Linux User Administration
- [3.14] Linux Working with Files, Permissions, and Directories
- [3.15] Working with Linux File Permissions
- [3.16] Linux Working with Groups
- [3.17] Linux Package Manager apt
- [3.18] Linux Useful Files
- Module 3 Study Materials
Networking Refresher
- [4.1] The OSI Model – Open Systems Interconnection
- [4.2] More on OSI Model – Introduction to TCP-IP Model
- [4.3] TCP-IP v-s OSI – The Difference
- [4.4] Data Link Layer and MAC Addresses
- [4.5] Network Layer and IP Addresses
- [4.6] Classful IP Addressing, Private and Special Addresses
- [4.7] Classless IP Addressing
- [4.8] Transport Layer
- [4.9] Ports and Port Addressing
- [4.10] Proxies and Proxy Servers
- [4.11] Introduction to TOR
- [4.12] Introduction to VPN
- [4.13] Remote Login – SSH and telnet
- [4.14] Introduction to NAT and Port Forwarding
- Module 4 Study Material
Footprinting and Reconnaissance
- [5.1] Introduction to Footprinting and Objectives
- [5.2] Footprinting through search Engines
- [5.3] Introduction to OSINT
- [5.4] Email Footprinting
- [5.5] Website Footprinting
- [5.6] Competitive Intelligence
- [5.7] Internet Archive
- [5.8] wget Mirroring
- [5.9] Website Mirroring with httrack
- [5.10] whois lookup
- [5.11] Introduction to DNS Footprinting
- [5.12] DNS Resource Records
- [5.13] DNS Footprinting with DNS Dumpster
- [5.14] dns.google.com
- [5.15] Network Footprinting
- [5.16] Introduction and Working of Traceroute
- [5.17] Traceroute Analysis
- [5.18] Introduction to Maltego
- [5.19] Maltego Information Gathering with domain name
- [5.20] Maltego Information Gathering with IP Address
- [5.21] Maltego Using the Tool Efficiently
- [5.22] Maltego Tranform Hub
- [5.23] Maltego Integration with Shodan
- [5.24] OSINT Framework
- [5.25] theHarvester
- [5.26] Shodan Introduction and First Look
- [5.27] Shodan Advanced Search with Dorks
- [5.28] WhatWeb
- [5.29] Wappalyzer
- [5.30] sublist3r
- [5.31] Subdomain Finder Websites
- [5.32] netdiscover
- [5.33] Major IP Block
- [5.34] Google Dorks Explained – What is Google Hacking
- [5.35] Working with Google Dorks – Google Dorking Practical
- [5.36] Footprinting with Social Engineering
- [5.37] Footprinting Countermeasures
- Module 5 Study Material
Scanning
- [6.1] Basics of Scanning
- [6.2] Scanning Methodology
- [6.3] Working with ping command for live hosts
- [6.4] Angry IP Scanner
- [6.5] TCP Flags
- [6.6] TCP 3-Way Handshake
- [6.7] Introduction to Port Scanning
- [6.8] Port Scanning Methodology
- [6.9] Types of Port Scanning – TCP Connect Scan
- [6.10] Types of Port Scanning – TCP Stealth Scan
- [6.11] Types of Port Scanning – TCP Inverse Flag Scanning
- [6.12] Types of Port Scanning – TCP Xmas Scan
- [6.13] Types of Port Scanning – ACK Flag Probe Scanning
- [6.14] Types of Port Scanning – UDP Scan
- [6.15] Introduction to Nmap and First Look
- [6.16] Nmap – Port Scanning
- [6.17] Nmap – Advanced Port Scanning
- [6.18] Nmap – Bypass Firewalls and IDS
- [6.19] Nmap – Types of Scans
- [6.20] Port Scanning with hping3
- [6.21] Port Scanning with pentest-tools
- [6.22] Colasoft Packet Builder
- [6.23] Introduction to Banner Grabbing
- [6.24] Banner Grabbing with ID Serve
- [6.25] Banner Grabbing with NetCraft
- [6.26] Banner Grabbing with netcat
- [6.27] Evading IDS and Firewalls
- [6.28] Scanning for Vulnerabilities
- [6.29] Nessus Vulnerability Scanner
- [6.30] Nmap Scripting Engine
- [6.31] nikto Web Vulnerability Scanner
- [6.32] OpenVas Installation and Configuration
- [6.33] Vulnerability Scanning with OpenVas
- [6.34] WordPress Vulnerability Scanning with wpscan
- [6.35] Mapping Networks
- [6.36] Network Topology Mapper
- [6.37] Spiceworks Network Mapper
- [6.38] LAN State Pro
- [6.39] Scanning Countermeasures
- Module 6 Study Materials
Enumeration
- [7.1] Introduction to Enumeration
- [7.2] Techniques of Enumeration
- [7.3] NetBIOS enumeration
- [7.4] SMB Enumeration
- [7.5] Working wiith NetBIOS and SMB Enumeration
- [7.6] SNMP Enumeration
- [7.7] LDAP Enumeration
- [7.8] SMTP Enumeration
- [7.9] Working with SMTP Enumeration
- [7.10] DNS Enumeration
- [7.11] Introduction to DNS Zones
- [7.12] Introduction to DNS Zone Transfer
- [7.13] DNS Zone Transfer using host command
- [7.14] nslookup tool
- [7.15] DNS Zone Transfer using nslookup
- [7.16] dig command
- [7.17] DNS Zone Transfer using dig command
- [7.18] NTP Enumeration
- [7.19] Enumeration Countermeasures
- Module 7 Study Materials
BONUS Section
- Port Scanning: Introduction to Masscan
Watch Online On Mega
Last edited by a moderator: