0% found this document useful (0 votes)
660 views

Bitten Tech - TechHacker Pre-Hacking Complete Course

Uploaded by

rhznsym2bx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
660 views

Bitten Tech - TechHacker Pre-Hacking Complete Course

Uploaded by

rhznsym2bx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Bitten Tech | TechHacker Pre-Hacking Complete Course

Let me clear first thing if you watch all videos of these course then no one can
stopped you to become ethical hacker

💢 Course Curriculum :
Introduction
[1.1] Introduction to Information Security

[1.2] Information-Security-Threats

[1.3] Introduction to Cyber Security

[1.4] The CIA Triad

[1.5] Who are Hackers

[1.6] Types of Hackers

[1.7] Introduction to Ethical Hacking

[1.8] Information Warfare

[1.9] Need for Ethical Hackers

[1.10] Careers in Ethical Hacking

[1.11] Course Overview

[1.12] General Terminologies

[1.13] How To become an Ethical Hacker

Module 1 Study Materials

Basics and Environment setup


[2.1] Advantages and Limitations of Cyber Security

[2.2] Cyber Defense

[2.3] Skills of an Ethical Hacker

[2.4] Information Security Policies

[2.5] Vulnerability Research


[2.6] Introduction to OS Linux and it’s Evolution

[2.7] Major Linux Distributions

[2.8] Advantages of linux

[2.9] Linux for Penetration Testing

[2.10] Types of Hackers contd

[2.11] Phases of Ethical Hacking

[2.12] Introduction to Penetration Testing

[2.13] Phases of Penetration Testing

[2.14] Cyber Security vs Ethical Hacking

[2.15] Ethical Hacking Laws and Policies

[2.16] IT Act 2000

[2.17] Risk Management and Methodology

[2.18] Software and Hardware Requirements for a Hacking Lab

[2.19] Installing and Configuring VMWare WS

[2.20] Dual boot vs Virtual Machine

[2.21] Choosing and Downloading Kali Distro

[2.22] Configuring VM For Kali Linux

[2.23] Installing Kali Linux 2019.4 on VMWare (New)

[2.24] Virtual Network Configurations Explained – NAT vs Bridged vs Host Only vs Internal

[2.25] Installating and Configuring DVWA

[2.26] Installating and Configuring bWAPP

[2.27] Installing Metasploitable on VM

[2.28] Installing OWASP Broken Web Application on VMWare

Module 2 Study Materials


Linux Refresher
[3.1] Introduction to Command Line

[3.2] Windows command line

[3.3] Linux command line

[3.4] Linux File System

[3.5] NTFS vs FAT vs EXT

[3.6] Linux User Administration

[3.7] Basic DOS Commands

[3.8] DOS Networking Commands

[3.9] Kali 2019.4 and linux file system overview

[3.10] Linux Elementary Commands

[3.11] Linux Networking Commands

[3.12] history and grep command

[3.13] Working with Linux User Administration

[3.14] Linux Working with Files, Permissions and Directories

[3.15] Working with Linux File Permissions

[3.16] Linux Working with Groups

[3.17] Linux Package Manager apt

[3.18] Linux Useful Files

Module 3 Study Materials

Networking Refresher
[4.1] The OSI Model – Open Systems Interconnection

[4.2] More on OSI Model – Introduction to TCP-IP Model

[4.3] TCP-IP v-s OSI – The Difference

[4.4] Data Link Layer and MAC Addresses


[4.5] Network Layer and IP Addresses

[4.6] Classful IP Addressing, Private and Special Addresses

[4.7] Classless IP Addressing

[4.8] Transport Layer

[4.9] Ports and Port Addressing

[4.10] Proxies and Proxy Servers

[4.11] Introduction to TOR

[4.12] Introduction to VPN

[4.13] Remote Login – SSH and telnet

[4.14] Introduction to NAT and Port Forwarding

Module 4 Study Material

Footprinting and Reconnaissance


[5.1] Introduction to Footprinting and Objectives

[5.2] Footprinting through search Engines

[5.3] Introduction to OSINT

[5.4] Email Footprinting

[5.5] Website Footprinting

[5.6] Competitive Intelligence

[5.7] Internet Archive

[5.8] wget Mirroring

[5.9] Website Mirroring with httrack

[5.10] whois lookup

[5.11] Introduction to DNS Footprinting

[5.12] DNS Resource Records

[5.13] DNS Footprinting with DNS Dumpster


[5.14] dns.google.com

[5.15] Network Footprinting

[5.16] Introduction and Working of Traceroute

[5.17] Traceroute Analysis

[5.18] Introduction to Maltego

[5.19] Maltego Information Gathering with domain name

[5.20] Maltego Information Gathering with IP Address

[5.21] Maltego Using the Tool Efficiently

[5.22] Maltego Tranform Hub

[5.23] Maltego Integration with Shodan

[5.24] OSINT Framework

[5.25] theHarvester

[5.26] Shodan Introduction and First Look

[5.27] Shodan Advanced Search with Dorks

[5.28] WhatWeb

[5.29] Wappalyzer

[5.30] sublist3r

[5.31] Subdomain Finder Websites

[5.32] netdiscover

[5.33] Major IP Block

[5.34] Google Dorks Explained – What is Google Hacking

[5.35] Working with Google Dorks – Google Dorking Practical

[5.36] Footprinting with Social Engineering

[5.37] Footprinting Countermeasures


Module 5 Study Material

Scanning
[6.1] Basics of Scanning

[6.2] Scanning Methodology

[6.3] Working with ping command for live hosts

[6.4] Angry IP Scanner

[6.5] TCP Flags

[6.6] TCP 3-Way Handshake

[6.7] Introduction to Port Scanning

[6.8] Port Scanning Methodology

[6.9] Types of Port Scanning – TCP Connect Scan

[6.10] Types of Port Scanning – TCP Stealth Scan

[6.11] Types of Port Scanning – TCP Inverse Flag Scanning

[6.12] Types of Port Scanning – TCP Xmas Scan

[6.13] Types of Port Scanning – ACK Flag Probe Scanning

[6.14] Types of Port Scanning – UDP Scan

[6.15] Introduction to Nmap and First Look

[6.16] Nmap – Port Scanning

[6.17] Nmap – Advanced Port Scanning

[6.18] Nmap – Bypass Firewalls and IDS

[6.19] Nmap – Types of Scans

[6.20] Port Scanning with hping3

[6.21] Port Scanning with pentest-tools

[6.22] Colasoft Packet Builder


[6.23] Introduction to Banner Grabbing

[6.24] Banner Grabbing with ID Serve

[6.25] Banner Grabbing with NetCraft

[6.26] Banner Grabbing with netcat

[6.27] Evading IDS and Firewalls

[6.28] Scanning for Vulnerabilities

[6.29] Nessus Vulnerability Scanner

[6.30] Nmap Scripting Engine

[6.31] nikto Web Vulnerability Scanner

[6.32] OpenVas Installation and Configuration

[6.33] Vulnerability Scanning with OpenVas

[6.34] WordPress Vulnerability Scanning with wpscan

[6.35] Mapping Networks

[6.36] Network Topology Mapper

[6.37] Spiceworks Network Mapper

[6.38] LAN State Pro

[6.39] Scanning Countermeasures

Module 6 Study Materials

Enumeration
[7.1] Introduction to Enumeration

[7.2] Techniques of Enumeration

[7.3] NetBIOS enumeration

[7.4] SMB Enumeration

[7.5] Working wiith NetBIOS and SMB Enumeration

[7.6] SNMP Enumeration


[7.7] LDAP Enumeration

[7.8] SMTP Enumeration

[7.9] Working with SMTP Enumeration

[7.10] DNS Enumeration

[7.11] Introduction to DNS Zones

[7.12] Introduction to DNS Zone Transfer

[7.13] DNS Zone Transfer using host command

[7.14] nslookup tool

[7.15] DNS Zone Transfer using nslookup

[7.16] dig command

[7.17] DNS Zone Transfer using dig command

[7.18] NTP Enumeration

[7.19] Enumeration Countermeasures

Module 7 Study Materials

BONUS Section
Port Scanning: Introduction to Masscan

🔹Iɴғᴏʀᴍᴀᴛɪᴏɴ :
🖥 Video Language :- Hindi
📦 Size :- 10 GB
💵 Price :- 1500 INR
💸 Our Price:- Free ❤️

Click here to download

You might also like