Cyber Security and Ethical Hacking

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

CYBER SECURITY AND ETHICAL HACKING LEVEL 1

Module 1: Basics of Cyber Security and Ethical hacking


 Introduction to Ethical Hacking
 Case Studies
 Elements of Information Security
 Threat Categories
 Methodologies/Phases of Ethical Hacking
 Types of Hackers
 Vulnerability, Threat and Exploit

Module 2: Networking Concepts

 Basics of Networking from WAN


 IP Address v4 and v6
 Ports and Services
 Tracing an IP Address
 Measuring the Bandwidth of your Network
 Proxy and its Types

Module 3: Attack Scenarios

 IP and Port Scanning


 Working on a Live Router
 Network Scanning Internal and External
 Understanding Network Devices like Switch/Repeater
 Default Password Attack
 Securing an Organizational Network
 Securing a Home Network
 Tool set for Smartphone for Network Security

Module 4: Information Gathering

 WHOIS and Way Back Machine


 Extracting Information from SNMP
 DNS Enumeration
 Service Discovery Through Ports
 LDAP and NTP Enumeration
 Security from Enumeration

Module 5: Basics of Google Ethical Hacking

 What is Google Hacking


 Searching for Open Cameras by Google Hacking

Module 6: Antivirus

 What is Virus?
 Virus and Its types
 Virus and Worm
 Malware Detection
 Demonstrating Virus
 Scanning a file with different antivirus for free
 Recommending an Antivirus for your Complete Security

Module 7: Stolen Laptop or Mobile Tracing

 Recommended Tools to install on your Mobile or Laptop


 Tracing your lost device
 Reporting to the Police

Module 8: Email and Social Networking Ethical Hacking

 What is Email E-Hacking?


 Tracing Email
 Email Account E-Hacking
 How to Secure your Email Accounts
 Gmail Security
 Facebook Security
 Instagram Security
 LinkedIn Security

Module 9: Virtual Lab Preparation

 Introduction to Virtualisation
 Virtualisation using VMware, Virtual Box and Hyper-V
 Installation of Windows and Linux
 Sandboxing an OS

Module 10: Ethical Hacking Windows

 What is server and client


 Deep Freeze
 Binder
 Drive lock
 Key Logger
 Mobile Key Logger
 Host
 Brute Force
 RDP and RDP Purchasing

Module 11: Digital Forensics and USB Ethical Hacking

 Recover data from the USB Pen drives, Hard Disk Drive – Police Forensic way
 Permanent Data Deletion
 USB password recovery
 Auto copy USB
 Restrict the use of External Drive

Module 12: Windows Password Recovery

 Making USB Pen Drive Bootable


 Booting an OS by UEFI and Legacy
 MBR & GPT Hard disk Enumeration for Rootkits
 BIOS Attacks & Security
 Password Bypass
 Getting the Administrator/Root access
 Running Exploits
 Clearing Tracks
 Securing the Windows Account with SAM Lock Tool
 More on Securing Window Administrative Password

Module 13: Registry Ethical Hacking

 Updating the registry


 Fixing the loopholes
 Group Policy restrictions

Module 14: Backing-UP and Windows Security

 Recovery Points
 Backup & Restoration of an OS
 Norton Ghost
 System Vulnerability Assessment Automated & Manually

Module 15: WIFI Ethical Hacking

 WIFI Brute Force Attack


 WPS Attack
 Default SSID

Module 14: Basics of Website Hacking


 Website & Types
 Bandwidth Option
 Types of Flaws in Website
 Security Options

You might also like