Course Detail: Overview of Topics
Part 1: Introduction
- Introduction to Hacking
- All about Cyber World
- Introduction to Cyber Laws
- Study of various IT acts
- Hackers Psychology
- Learning Linux from hacking point of view
Part 2: Network Security
- Introduction to Networking
- Wi-Fi Hacking
- Intercepting packets: Man in the Middle attack
- DoS and DDoS attacks
- Vulnerability Assessment by mastering nmap
- Nessus vulnerabilities scanning
- Hacking with metasploit
- Hacking Networks by evading firewalls
- Packet crafting with hping3 and scapy
- Taking down Networks
- Study of popular vulnerabilities and their exploitation
- Countermeasures
Part 3: Playing with Passwords
- Windows Password cracking
- Various techniques of password cracking
- Encrypted documents password cracking
- Hacking psychology of users
- Various password storing techniques
Part 4: Windows hacking and Security
- Windows hacking by changing
- Cracking passwords
- Playing with User accounts
- Remote hijacking with RATs
- Getting into system by escalating privileges
- Encrypting File System
- Windows Firewall with Advanced Security
- At last staying safe: Setting up a secure system
Part 5: Web Application Hacking
- Introduction to web technologies
- Information Gathering techniques
- Intercepting requests, responses and playing with them
- Hacking live Website
- Mastering Web attacks
- Database dump with SQL Injection
- Exploiting users with Cross-Site Scripting(XSS)
- Session Hijacking
- Shell Upload, take everything down
- User accounts hacking
- Clickjacking Attack
- Security Misconfiguration
- Remote Code execution vulnerability
- File Inclusion Vulnerability
- Hands-on Live Website
- Securing own Website
Part 6: Abstract
- Email Hacking
- Email Spoofing
- Hacking by Phishing
- Rootkits
- Spywares
- Keyloggers
- Webcam hacking
- Social Engineering Techniques
- Steganography: Hiding and Detection
- Ciphers and Cryptography
- Hacking by Scripting
- Playing with malwares
- Deleted data recovery
- Working on Digital Forensics
- Image Forensics
- Case investigation
- Evidence recovery
- Securing Windows
- Server Hardening