• Breaking News

    Introduction to Ethical Hacking

    Introduction to Ethical Hacking


    1. General introduction
      Setup VM
    2. install kali Linux/parrot os
    3. Hands on kali Linux/parrot os
    4. Hands on windows cmd tools
    5. Networking Concepts and network protocols
    6. Cyber laws
    7. Internet governance
    8. Reconnaissance (foot printing)
    9. Google hacking
    10. Scanning
    11. Enumeration
    12. System Hacking
    13. Proxies Servers
    14. keyloggers
    15. Trojans and Backdoors
    16. Viruses and warms
    17. Sniffing
    18. Social Engineering
    19. Emails hacking
    20. Session Hijacking
    21. Hacking Webservers
    22. SQL injection
    23. XSS attacks( cross site scripting)
    24. CSRF attack’s (Cross site Request Forgery)
    25. DOS and DDOS attack
    26. Introduction and working with exploits
    27. Buffer overflow
    28. Reverse Engineering
    29. Cryptography
    30. Firewalls and Honey Ports
    31. Physical security
    32. Hacking wireless Network
    33. Penetration Testing
    34. Hacking Routers
    35. Hacking Mobile devices
    36. Introduction to computer forensic
    37. Introduction to Application penetration Testing

    No comments

    Post Bottom Ad