What the Hack-1.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
hack%fy CYBER SECURITY What The Hack-1- COURSE CONTENT • Chapter 1 -Introduction to Hacking • What is Hacking • Breaking the Myth. • Hackers vs Crackers • What are the types of hacker • Not Being a Noob • CIA Triad • CIA Practical • Have I been pwned • Chapter 2 – Dive in Hacking • What is VAPT • Future in Cyber Security • USB Stealer • Zip Bomb • Fork Bombs • Ports and Protocols • Practical - Ports and Protocols • Practical - Sandbox • Chapter 3 – Working with Networks • What is IP • IP vs MAC • Types of IP • IPv4 & IPv6 • Topology • Types of topology • OSI /TCP – IP • UDP vs TCP • TCP 3-Way Handshake • Chapter 4 – Scanning the Hackers Way • What is scanning • Tools for scanning • Tips and Tricks for scanning • Chapter 5 – Using Google smartly for Hacking • Introduction to Google Hacking • How to use Google Dorks • Robots File • OSINT • Chapter 6 - Malware / Trojan • What is malware • Introduction to Malware Family • Batch file viruses • Let’s make some Ransomwares • Key loggers - Practical • Chapter 7 – Introduction to Linux • What is Linux • What are Penetration OS • Kali Linux • Parrot OS • Chapter 8 - Android Hacking & Security • Creating backdoor • Using Metasploit • creating malicious application • Exploiting Android • Chapter 9- Denial of service • Introduction to DOS • Launching a DDOS Attack • Practicing for DDOS • Tools • Protecting yourself and Countermeasures • Chapter 10 - Password Cracker • PDF password Brute Force • Wordlist with Crunch • Recovering Lost Password • The Hackers Choice - Hydra • Chapter 11 - Phishing / Social engineering • What is Phishing • Performing Phishing • Facebook hacking • Social engineering • Vishing/Smshing • Chapter 12 - E-mail Security • Introduction to Email security • How Email works • Hacking Mail clients • Fake mail • How to check Fake mail • Counter Measure • SPF • DMARC • Chapter 13 - Cryptography & Steganography • Introduction • steganography Tools • Practical and tools • Counter Measure • Chapter 14 - Wi-Fi Hacking • Wi-Fi Types • Hacking WEP/WPA2 • Tools to hack Wi-Fi • Counter Measure • Chapter 15 - Cyber Forensics • Introduction • Malware Analysis Basics • Data Recovery • RAM Dumper Duraon: 60 Hrs..