0% found this document useful (0 votes)
61 views6 pages

CSP Certified Ethical Hacker: Highlights

This document outlines a 30-day course on ethical hacking with 15 modules. It will cover topics like identity changing, basic hacking using command prompts, social media and mobile hacking, virus creation and prevention, web attacks, data security, WiFi hacking, the deep web, and cyber law. The goal is to teach students how to hack like an ethical hacker in order to strengthen cyber security defenses and the course costs Rs. 10,000.

Uploaded by

dhaval
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views6 pages

CSP Certified Ethical Hacker: Highlights

This document outlines a 30-day course on ethical hacking with 15 modules. It will cover topics like identity changing, basic hacking using command prompts, social media and mobile hacking, virus creation and prevention, web attacks, data security, WiFi hacking, the deep web, and cyber law. The goal is to teach students how to hack like an ethical hacker in order to strengthen cyber security defenses and the course costs Rs. 10,000.

Uploaded by

dhaval
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CSP Certified Ethical Hacker

30 Days | 30 Hours | Fees : Rs 10000

HIGHLIGHTS
01 | Introduction
02 | Identity Changing
03 | Basic Hacking Using CMD
04 | Social Media Hacking And Security
05 | Windows Hacking And Security
06 | Windows System Monitoring
07 | Android Phone Hacking And Security
08 | Virus Creation And Prevention
09 | Web Attacks And Prevention
10 | Data Security
11 | Online Banking Transaction
12| WIFI Hacking And Security
13 | Deep Web : The Hidden Internet
14 | Cyber Crime And Cyber Law
15 | Test 
MODULE 01 | INTRODUCTION

| What is Hacking ?
| What is Ethical Hacking ?
| Types of Hackers
| What is Operating System ?
| What is Software ?
System Software | Application Software | Utility Software
| What is Hardware ?
| Input Devices : Keyboard, Mouse, Scanner
| Processing Devices : CPU and GPU
| Output Devices : Monitor,Speaker, Printer
| Storage Devices : RAM, ROM, HDD, SSD, USB Drive, External HDD
| What is Network ?
| What is HUB, SWITCH and ROUTER ?
| What is Server ?
| What is Client ?
| What is ISP ?
| IP Address : Local IP Address and Public IP Address
| What is Submarine Cable ?
| How Real Internet Works ?

MODULE 02 | IDENTITY CHANGING


* Change IP Address : Proxy and VPN and BlackHat Way
* Change MAC Address
* Change OS and Browser

MODULE 03 | BASIC HACKING USING CMD


* Finding Website IP Address
* Finding Computer and Routers Local IP
* Finding Computer Name and Username
* Finding Users on the Target System
* Change Admin Password without Knowing Current Password
* Find Saved WIFI Passwords from Target System
MODULE 04 | SOCIAL MEDIA HACKING AND SECURITY
[ Facebook, Instagram, Email, WhatsApp ]

| What is Keylogger ?
* Using Revealer Keylogger
* Using Flash Keylogger
* Using Saved Logins
* Using OTP Stealing with Android Messages
* Using Phishing

| Security ?
 Never login from unknown devices
 Never give your device to anyone
 Set 2FA
 Never login from any
link
 Never REMEMBER PASSWORD in Browsers

MODULE 05 | WINDOWS HACKING AND SECURITY


| What is Password ?
| What is LM and NTLM ?
| What is Password Hashes ?
| What is SAM ?
* How to Bypass Windows Password ?
* How to Set Backdoor in Windows ?

| Security ?
 Set BIOS Password
 Set BITLOCKER on System Drive

MODULE 06 | WINDOWS SYSTEM MONITORING


| What is Employee Monitoring ?
| Why to Monitor Employee Activity ?
| Is it Legal to Monitor Your Employees Activities ?
* Setup Monitoring on A Company Computers with Classroom Spy
MODULE 07 | ANDROID PHONE HACKING AND SECURITY
| What is Android ?
| What is Spyware ?
| Why Android is Hackable ?
| Why iOS is not Hackable ?
* Lets Hack Your Own Phone ;)
> Spy on Targets SMS, Calls and Contact Numbers
> Spy on Targets Phone Camera
> Spy on Targets WhatsApp | Instagram | Facebook
> Spy on Targets Files on His or Her Phone
> Spy on Targets Live Mobile Screen

* SMS Bombing and Protection


* Anonymous Calling
* Finding Pictures of Contact Numbers in Our Contact list

| Security ?
 Don’t give your phone to anybody for even 2 minutes.
 Turn on Play Protect always.
 Don’t install apps from Unknown Sources about Hacking.

MODULE 08 | VIRUS CREATION AND PREVENTION


| What is Virus ?
| What is Trojan ?
| What is Ransomware ?

| Creating Our Own Virus


* System Crasher
* Data Hider
* Data Wiper
* WinLocker
* Creating EXE of VIRUS

| Security ?
 Turn On Windows Defender or Use Anti Virus Program
 Never open any unknown file
 Test any unknown file on VIRUSTOTAL.COM before executing
MODULE 09 | WEB ATTACKS AND PREVENTION
| What is Website ?
| What is Domain ?
| What is Hosting ?
| What is Webserver ?
How it Works ?
* DOS Attack
* DDOS Attack

| Security ?
 Using DDOS Protection Service

MODULE 10 | DATA SECURITY


* Disable USB Ports on Your Laptop or Desktop
* Lock Your Keyboard and Mouse
* Hide Files and Folders
* Hide Drives
* Protect Application using PassDoor
* Block Website
* Data Backup Policy
* Data Recovery : Phone – Laptop – USB Drive – External HDD
* Steganography : Data Hiding Technique
* Turn on Windows Firewall
* Turn on Windows Defender

MODULE 11 | ONLINE BANKING TRANSACTION


 Always use your own Laptop or Phone for online banking transactions
 Never use Open WIFI.
 Never give your phone to anyone, they can install SPYWARE on your PHONE
 Never give your laptop to anyone they can install computer spyware on your
laptop or Desktop
 Don’t share your Account details with strangers on mail
 Remember to receive a payment you don’t need to enter your UPI PIN, Only
the time of payment you need to do it.
MODULE 12| WIFI HACKING AND SECURITY
| Introduction to WIFI
| Wi-Fi Security : WEP, WPA and WPA2
| Why WIFI Is Not Hackable ?
* Finding Who is Connected to our WIFI on Android
* Finding Saved WIFI Passwords on Windows
* Find Routers IP and Access : Change WIFI Name and Password
* Making WIFI Jammer using NODE MCU ESP8266

MODULE 13 | DEEP WEB : THE HIDDEN INTERNET


| Introduction
| What is Deep Web ?
| What is Dark Web ?
| What is TOR ?
| History of TOR
| How TOR Works ?
| What is TOR Circuit ?
* Deep Web Search Engine : Ahmia
* What is RED ROOM ?
* Hitmen Service
* Drugs
* Weapons
| Bitcoin : Payment Method of TOR
| Precautions to Use While Surfing Deep Web

MODULE 14 | CYBER CRIME AND CYBER LAW


| What is Cyber Crime ?
| What is Cyber Law ?
| History of Cyber Law in India
| Some Important Cyber Law to Remember

MODULE 15 | TEST 

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy