Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
44 views4 pages

Hacking - Course Outline

The document outlines a comprehensive course on Cybersecurity and Ethical Hacking, covering various modules including an introduction to cybersecurity concepts, networking fundamentals, tools for ethical hacking, reconnaissance, scanning, gaining access, post-exploitation techniques, web application hacking, wireless security, malware development, and defense strategies. Each module includes specific topics and tools relevant to the field, such as the MITRE ATT&CK framework, Kali Linux, OWASP Top 10 vulnerabilities, and various attack and defense techniques. The course aims to equip learners with both offensive and defensive cybersecurity skills.

Uploaded by

Sheeban Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views4 pages

Hacking - Course Outline

The document outlines a comprehensive course on Cybersecurity and Ethical Hacking, covering various modules including an introduction to cybersecurity concepts, networking fundamentals, tools for ethical hacking, reconnaissance, scanning, gaining access, post-exploitation techniques, web application hacking, wireless security, malware development, and defense strategies. Each module includes specific topics and tools relevant to the field, such as the MITRE ATT&CK framework, Kali Linux, OWASP Top 10 vulnerabilities, and various attack and defense techniques. The course aims to equip learners with both offensive and defensive cybersecurity skills.

Uploaded by

Sheeban Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Cybersecurity and Ethical Hacking Full Course

Outline

Module 1: Introduction to Cybersecurity & Ethical Hacking


• What is Cybersecurity?
• Types of Hackers: White Hat, Black Hat, Grey Hat
• Introduction to Ethical Hacking
• Cybersecurity Domains
• Legal and Ethical Aspects
• Cyber Kill Chain & MITRE ATT&CK Framework
• Phases of Ethical Hacking:
o Reconnaissance
o Scanning
o Gaining Access
o Maintaining Access
o Covering Tracks

Module 2: Networking Fundamentals for Hackers


• OSI & TCP/IP Models
• IP Addressing & Subnetting
• Common Protocols (TCP, UDP, DNS, DHCP, ICMP)
• NAT, Port Forwarding, and VLANs
• Network Devices: Routers, Switches, Firewalls

Module 3: Tools of the Trade


• Kali Linux & Parrot OS
• Virtualization (VMware, VirtualBox, Proxmox)
• Basic Command Line for Linux & Windows
• Tools Overview:
o Nmap
o Wireshark
o Burp Suite
o Metasploit
o John the Ripper
o Nikto
o Gobuster
o Hydra
o Sqlmap
o Nessus / OpenVAS

Module 4: Reconnaissance and Information Gathering


• Passive Reconnaissance
• Active Reconnaissance
• Google Dorking
• WHOIS & DNS Enumeration
• Social Engineering & OSINT
o Maltego, Reconng, Spiderfoot

Module 5: Scanning & Enumeration


• Network Scanning (Nmap)
• Banner Grabbing
• Vulnerability Scanning (Nessus, Nikto)
• SMB, SNMP, FTP, SMTP Enumeration

Module 6: Gaining Access


• System Hacking Basics
• Exploiting Network Vulnerabilities
• Exploit Development Introduction
• Metasploit Framework
• Brute Force Attacks (Hydra, Medusa)
• Password Attacks:
o Dictionary
o Rainbow Table
o Cracking Hashes

Module 7: Post Exploitation & Maintaining Access


• Privilege Escalation Techniques (Linux & Windows)
• Creating Persistence
• Covering Tracks (Log Tampering)
• Pivoting & Lateral Movement
• Tunneling and Port Forwarding
Module 8: Web Application Hacking
• OWASP Top 10:
o SQL Injection
o XSS
o CSRF
o File Inclusion
o Command Injection
o Security Misconfiguration
• Burp Suite Advanced
• Web Shells & RCE
• Cookie Hijacking
• SSRF, IDOR, Broken Authenticatio

Module 9: Wireless
• Wireless Protocols & Security (WEP, WPA/WPA2, WPA3)
• WiFi Attacks:
o Deauthentication Attack
o Evil Twin
o WPA Handshake Cracking
• Bluetooth Exploits
• Mobile OS Architecture (Android & iOS)

Module 10: Malware and Exploit Development


• Types of Malware: Ransomware, Trojans, Worms
• Creating Payloads with MSFvenom
• Antivirus Evasion Techniques
• Basic Buffer Overflow
• Shellcoding & Assembly Basics
• FUD Payloads and Packers

Module 11: Blue Teaming & Defense Techniques


• Security Layers
• Network Security
• Endpoint Security
• Application Security
• Data Security
• Cloud Security

Blue Team Tools & Concepts


• EDR (Endpoint Detection & Response)
• NDR (Network Detection & Response)
• IDS / IPS (Intrusion Detection/Prevention System)
• XDR (Extended Detection & Response)
• MDR (Managed Detection & Response)
• SIEM (Security Information & Event Management)
• SOAR (Security Orchestration, Automation & Response)
• UEBA (User & Entity Behavior Analytics)
• DDI (DNS, DHCP, and IPAM)
• Firewall Types & Configurations
• Threat Intelligence Platforms (TIP)
• Vulnerability Management
• Log Analysis & Threat Hunting
• Incident Response Life Cycle
• Security Hardening Techniques

You might also like