What the Hack-1.Pdf

What the Hack-1.Pdf

hack%fy CYBER SECURITY What The Hack-1- COURSE CONTENT • Chapter 1 -Introduction to Hacking • What is Hacking • Breaking the Myth. • Hackers vs Crackers • What are the types of hacker • Not Being a Noob • CIA Triad • CIA Practical • Have I been pwned • Chapter 2 – Dive in Hacking • What is VAPT • Future in Cyber Security • USB Stealer • Zip Bomb • Fork Bombs • Ports and Protocols • Practical - Ports and Protocols • Practical - Sandbox • Chapter 3 – Working with Networks • What is IP • IP vs MAC • Types of IP • IPv4 & IPv6 • Topology • Types of topology • OSI /TCP – IP • UDP vs TCP • TCP 3-Way Handshake • Chapter 4 – Scanning the Hackers Way • What is scanning • Tools for scanning • Tips and Tricks for scanning • Chapter 5 – Using Google smartly for Hacking • Introduction to Google Hacking • How to use Google Dorks • Robots File • OSINT • Chapter 6 - Malware / Trojan • What is malware • Introduction to Malware Family • Batch file viruses • Let’s make some Ransomwares • Key loggers - Practical • Chapter 7 – Introduction to Linux • What is Linux • What are Penetration OS • Kali Linux • Parrot OS • Chapter 8 - Android Hacking & Security • Creating backdoor • Using Metasploit • creating malicious application • Exploiting Android • Chapter 9- Denial of service • Introduction to DOS • Launching a DDOS Attack • Practicing for DDOS • Tools • Protecting yourself and Countermeasures • Chapter 10 - Password Cracker • PDF password Brute Force • Wordlist with Crunch • Recovering Lost Password • The Hackers Choice - Hydra • Chapter 11 - Phishing / Social engineering • What is Phishing • Performing Phishing • Facebook hacking • Social engineering • Vishing/Smshing • Chapter 12 - E-mail Security • Introduction to Email security • How Email works • Hacking Mail clients • Fake mail • How to check Fake mail • Counter Measure • SPF • DMARC • Chapter 13 - Cryptography & Steganography • Introduction • steganography Tools • Practical and tools • Counter Measure • Chapter 14 - Wi-Fi Hacking • Wi-Fi Types • Hacking WEP/WPA2 • Tools to hack Wi-Fi • Counter Measure • Chapter 15 - Cyber Forensics • Introduction • Malware Analysis Basics • Data Recovery • RAM Dumper Duraon: 60 Hrs..

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us