0% found this document useful (0 votes)
57 views4 pages

Cyber Security and Ethical Hacking

Uploaded by

daljeetbhati98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views4 pages

Cyber Security and Ethical Hacking

Uploaded by

daljeetbhati98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CYBER SECURITY AND ETHICAL HACKING LEVEL 1

Module 1: Basics of Cyber Security and Ethical hacking


 Introduction to Ethical Hacking
 Case Studies
 Elements of Information Security
 Threat Categories
 Methodologies/Phases of Ethical Hacking
 Types of Hackers
 Vulnerability, Threat and Exploit

Module 2: Networking Concepts

 Basics of Networking from WAN


 IP Address v4 and v6
 Ports and Services
 Tracing an IP Address
 Measuring the Bandwidth of your Network
 Proxy and its Types

Module 3: Attack Scenarios

 IP and Port Scanning


 Working on a Live Router
 Network Scanning Internal and External
 Understanding Network Devices like Switch/Repeater
 Default Password Attack
 Securing an Organizational Network
 Securing a Home Network
 Tool set for Smartphone for Network Security

Module 4: Information Gathering

 WHOIS and Way Back Machine


 Extracting Information from SNMP
 DNS Enumeration
 Service Discovery Through Ports
 LDAP and NTP Enumeration
 Security from Enumeration

Module 5: Basics of Google Ethical Hacking

 What is Google Hacking


 Searching for Open Cameras by Google Hacking

Module 6: Antivirus

 What is Virus?
 Virus and Its types
 Virus and Worm
 Malware Detection
 Demonstrating Virus
 Scanning a file with different antivirus for free
 Recommending an Antivirus for your Complete Security

Module 7: Stolen Laptop or Mobile Tracing

 Recommended Tools to install on your Mobile or Laptop


 Tracing your lost device
 Reporting to the Police

Module 8: Email and Social Networking Ethical Hacking

 What is Email E-Hacking?


 Tracing Email
 Email Account E-Hacking
 How to Secure your Email Accounts
 Gmail Security
 Facebook Security
 Instagram Security
 LinkedIn Security

Module 9: Virtual Lab Preparation

 Introduction to Virtualisation
 Virtualisation using VMware, Virtual Box and Hyper-V
 Installation of Windows and Linux
 Sandboxing an OS

Module 10: Ethical Hacking Windows

 What is server and client


 Deep Freeze
 Binder
 Drive lock
 Key Logger
 Mobile Key Logger
 Host
 Brute Force
 RDP and RDP Purchasing

Module 11: Digital Forensics and USB Ethical Hacking

 Recover data from the USB Pen drives, Hard Disk Drive – Police Forensic way
 Permanent Data Deletion
 USB password recovery
 Auto copy USB
 Restrict the use of External Drive

Module 12: Windows Password Recovery

 Making USB Pen Drive Bootable


 Booting an OS by UEFI and Legacy
 MBR & GPT Hard disk Enumeration for Rootkits
 BIOS Attacks & Security
 Password Bypass
 Getting the Administrator/Root access
 Running Exploits
 Clearing Tracks
 Securing the Windows Account with SAM Lock Tool
 More on Securing Window Administrative Password

Module 13: Registry Ethical Hacking

 Updating the registry


 Fixing the loopholes
 Group Policy restrictions

Module 14: Backing-UP and Windows Security

 Recovery Points
 Backup & Restoration of an OS
 Norton Ghost
 System Vulnerability Assessment Automated & Manually

Module 15: WIFI Ethical Hacking

 WIFI Brute Force Attack


 WPS Attack
 Default SSID

Module 14: Basics of Website Hacking


 Website & Types
 Bandwidth Option
 Types of Flaws in Website
 Security Options

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy