hack fy CYBER SECURITY
What The Hack-1- COURSE CONTENT
• Chapter 1 -Introduction to Hacking
• What is Hacking
• Breaking the Myth.
• Hackers vs Crackers
• What are the types of hacker
• Not Being a Noob
• CIA Triad
• CIA Practical
• Have I been pwned
• Chapter 2 – Dive in Hacking
• What is VAPT
• Future in Cyber Security
• USB Stealer
• Zip Bomb
• Fork Bombs
• Ports and Protocols
• Practical - Ports and Protocols
• Practical - Sandbox
• Chapter 3 – Working with Networks • What is IP
• IP vs MAC
• Types of IP
• IPv4 & IPv6
• Topology
• Types of topology
• OSI /TCP – IP
• UDP vs TCP
• TCP 3-Way Handshake
• Chapter 4 – Scanning the Hackers Way
• What is scanning
• Tools for scanning
• Tips and Tricks for scanning
• Chapter 5 – Using Google smartly for Hacking
• Introduction to Google Hacking
• How to use Google Dorks
• Robots File
• OSINT
• Chapter 6 - Malware / Trojan
• What is malware
• Introduction to Malware Family
• Batch file viruses
• Let’s make some Ransomwares
• Key loggers - Practical
• Chapter 7 – Introduction to Linux
• What is Linux • What are Penetration OS
• Parrot OS
• Chapter 8 - Android Hacking & Security
• Creating backdoor
• Using Metasploit
• creating malicious application
• Exploiting Android
• Chapter 9- Denial of service
• Introduction to DOS
• Launching a DDOS Attack
• Practicing for DDOS
• Tools
• Protecting yourself and Countermeasures
• Chapter 10 - Password Cracker
• PDF password Brute Force • Wordlist with Crunch
• Recovering Lost Password
• The Hackers Choice - Hydra
• Chapter 11 - Phishing / Social engineering
• What is Phishing
• Performing Phishing
• Facebook hacking
• Social engineering
• Vishing/Smshing
• Chapter 12 - E-mail Security
• Introduction to Email security
• How Email works
• Hacking Mail clients
• Fake mail
• How to check Fake mail
• Counter Measure
• SPF
• DMARC
• Chapter 13 - Cryptography & Steganography
• Introduction
• steganography Tools
• Practical and tools
• Counter Measure
• Chapter 14 - Wi-Fi Hacking • Wi-Fi Types
• Hacking WEP/WPA2
• Tools to hack Wi-Fi
• Counter Measure
• Chapter 15 - Cyber Forensics
• Introduction
• Malware Analysis Basics
• Data Recovery
• RAM Dumper
Dura on: 60 Hrs.