Introduction To Ethical Hacking
Hands-on: Setting up the environment, tools, and networks
Introduction To Penetration Testing
Objective: In this module, we will be learning about how and why to perform penetration testing. What are all the security measures you have followed?
Topics:
Hands-on: Installing and configuring protection tools to be anonymous in a network
Setting Up a Penetration Testing and Network Security Lab
Objective: In this module, we will be learning about how to setup a penetration testing lab for experimenting tools
Topics:
Hands-on: Installing virtual machine and necessary operating systems for both Attacker and target
Final preparation to begin hacking
Objective: In this module, we will be learning about operating system basics, commands, scripting, network configuration
Topics :
Hands-on: Understanding command-line interface with shell scripting
How to Stay Anonymous Before you start Hacking
Objective: In this module, we will be learning about staying anonymous while browsing, accessing a filesystem
Topics :
Hands-on: Installing VPN, Tor service and Anonymous browser, evade from firewall and rules
Information Gathering – Getting to Know Your Targets
Objective: In this module, we will be learning about gathering basic information about a target from different sources. These steps involve manual and automated frameworks.
Topics :
Hands-on: How to get an IP address, email, software used, version, vulnerabilities, operating system, and miscellaneous data.
Network Scanning and Enumeration
Objective: In this module, we will be learning about enumerating data from different services In a network and operating system.
Topics :
Hands-on: When and where to use enumeration tools and how to scan hosts and ports
Vulnerability Scanning and Analysis
Objective: In this module, we will be learning about how to find vulnerabilities, exploits and how to use them
Topics:
Hands-on: How to scan an application for vulnerability and exploit using frameworks
Sniffing and Spoofing the Network
Objective: In this module, we will be learning about how to sniff, analyze packets in a network
Topics :
Hands-on: How to sniff data using packet capturing tools on windows, Linux, mac
NGROK
Objective: In this module, we will be learning about port forwarding and its importance.
Topics :
Hands-on: How to use NGROK command-line tool and forward a specific port
Network-Based Attacks
Objective : In this module, we will be learning about creating exploits and social networking techniques.
Topics :
Hands-on: How to create custom payload with the listener for windows, Linux, android
Post Exploitation
Objective: In this module, we will be learning about operating system architecture and operations
Topics :
Hands-on: How to create a backdoor and operate a shell in the background
Password Cracking Techniques
Objective: In this module, we will be learning about passwords, hash, cryptography, wordlists
Topics :
Hands-on: How to obtain hashes using various tools and how to decrypt it
Netcat for Ethical Hacking
Objective: In this module, we will be learning about reading and writing data in TCP or UDP connections.
Topics :
Hands-on: How to install and use Netcat with various options and combinations
Social Engineering Attacks
Objective: In this module, we will be learning about social engineering and its types to exploit humans and not computers.
Topics :
Hands-on: Installing SEToolkit and creating fake webpage like Gmail, Facebook, Instagram to harvest credentials from users
Android Hacking
Objective: In this module, we will be learning about android os architecture, vulnerabilities and how to create custom malware for remote administration.
Topics :
Hands-on: Creating a custom malware using Metasploit Framework and access remotely
Wireless Attacks
Objective: In this module, we will be learning about how to monitor, hack wifi networks and passwords.
Topics :
Hands-on: How to install wireless hacking tools, set your nic in monitor mode to scan the networks, obtain the hash, and decrypt the password
Web Application Attacks
Objective: In this module, we will be learning about how web services work, and identify vulnerabilities.
Topics :
Hands-on: Turn your pc to web server, setting up a database, and how to use a web vulnerability scanner
Anti Forensics
Objective: In this module, we will be learning about logs, reports, and evading
Topics :
Hands-on: How to clear logs and cover your track by using evading tools.