hackfy CYBER SECURITY

What The Hack-1- COURSE CONTENT

• Chapter 1 -Introduction to Hacking

• What is Hacking

• Breaking the Myth.

• Hackers vs Crackers

• What are the types of hacker

• Not Being a Noob

• CIA Triad

• CIA Practical

• Have I been pwned

• Chapter 2 – Dive in Hacking

• What is VAPT

• Future in Cyber Security

• USB Stealer

• Zip Bomb

• Fork Bombs

• Ports and Protocols

• Practical - Ports and Protocols

• Practical - Sandbox

• Chapter 3 – Working with Networks • What is IP

• IP vs MAC

• Types of IP

• IPv4 & IPv6

• Topology

• Types of topology

• OSI /TCP – IP

• UDP vs TCP

• TCP 3-Way Handshake

• Chapter 4 – Scanning the Hackers Way

• What is scanning

• Tools for scanning

• Tips and Tricks for scanning

• Chapter 5 – Using Google smartly for Hacking

• Introduction to Google Hacking

• How to use Google Dorks

• Robots File

• OSINT

• Chapter 6 - Malware / Trojan

• What is malware

• Introduction to Malware Family

• Batch file viruses

• Let’s make some Ransomwares

• Key loggers - Practical

• Chapter 7 – Introduction to

• What is Linux • What are Penetration OS

• Parrot OS

• Chapter 8 - Android Hacking & Security

• Creating backdoor

• Using Metasploit

• creating malicious application

• Exploiting Android

• Chapter 9- Denial of service

• Introduction to DOS

• Launching a DDOS Attack

• Practicing for DDOS

• Tools

• Protecting yourself and Countermeasures

• Chapter 10 - Password Cracker

• PDF password Brute Force • Wordlist with Crunch

• Recovering Lost Password

• The Hackers Choice -

• Chapter 11 - Phishing / Social engineering

• What is Phishing

• Performing Phishing

• Facebook hacking

• Social engineering

• Vishing/Smshing

• Chapter 12 - E-mail Security

• Introduction to Email security

• How Email works

• Hacking Mail clients

• Fake mail

• How to check Fake mail

• Counter Measure

• SPF

• DMARC

• Chapter 13 - Cryptography & Steganography

• Introduction

• steganography Tools

• Practical and tools

• Counter Measure

• Chapter 14 - Wi-Fi Hacking • Wi-Fi Types

• Hacking WEP/WPA2

• Tools to hack Wi-Fi

• Counter Measure

• Chapter 15 - Cyber Forensics

• Introduction

• Malware Analysis Basics

• Data Recovery

• RAM Dumper

Duraon: 60 Hrs.