Cybersecurity and Ethical Hacking Full Course
Outline
Module 1: Introduction to Cybersecurity & Ethical Hacking
• What is Cybersecurity?
• Types of Hackers: White Hat, Black Hat, Grey Hat
• Introduction to Ethical Hacking
• Cybersecurity Domains
• Legal and Ethical Aspects
• Cyber Kill Chain & MITRE ATT&CK Framework
• Phases of Ethical Hacking:
o Reconnaissance
o Scanning
o Gaining Access
o Maintaining Access
o Covering Tracks
Module 2: Networking Fundamentals for Hackers
• OSI & TCP/IP Models
• IP Addressing & Subnetting
• Common Protocols (TCP, UDP, DNS, DHCP, ICMP)
• NAT, Port Forwarding, and VLANs
• Network Devices: Routers, Switches, Firewalls
Module 3: Tools of the Trade
• Kali Linux & Parrot OS
• Virtualization (VMware, VirtualBox, Proxmox)
• Basic Command Line for Linux & Windows
• Tools Overview:
o Nmap
o Wireshark
o Burp Suite
o Metasploit
o John the Ripper
o Nikto
o Gobuster
o Hydra
o Sqlmap
o Nessus / OpenVAS
Module 4: Reconnaissance and Information Gathering
• Passive Reconnaissance
• Active Reconnaissance
• Google Dorking
• WHOIS & DNS Enumeration
• Social Engineering & OSINT
o Maltego, Reconng, Spiderfoot
Module 5: Scanning & Enumeration
• Network Scanning (Nmap)
• Banner Grabbing
• Vulnerability Scanning (Nessus, Nikto)
• SMB, SNMP, FTP, SMTP Enumeration
Module 6: Gaining Access
• System Hacking Basics
• Exploiting Network Vulnerabilities
• Exploit Development Introduction
• Metasploit Framework
• Brute Force Attacks (Hydra, Medusa)
• Password Attacks:
o Dictionary
o Rainbow Table
o Cracking Hashes
Module 7: Post Exploitation & Maintaining Access
• Privilege Escalation Techniques (Linux & Windows)
• Creating Persistence
• Covering Tracks (Log Tampering)
• Pivoting & Lateral Movement
• Tunneling and Port Forwarding
Module 8: Web Application Hacking
• OWASP Top 10:
o SQL Injection
o XSS
o CSRF
o File Inclusion
o Command Injection
o Security Misconfiguration
• Burp Suite Advanced
• Web Shells & RCE
• Cookie Hijacking
• SSRF, IDOR, Broken Authenticatio
Module 9: Wireless
• Wireless Protocols & Security (WEP, WPA/WPA2, WPA3)
• WiFi Attacks:
o Deauthentication Attack
o Evil Twin
o WPA Handshake Cracking
• Bluetooth Exploits
• Mobile OS Architecture (Android & iOS)
Module 10: Malware and Exploit Development
• Types of Malware: Ransomware, Trojans, Worms
• Creating Payloads with MSFvenom
• Antivirus Evasion Techniques
• Basic Buffer Overflow
• Shellcoding & Assembly Basics
• FUD Payloads and Packers
Module 11: Blue Teaming & Defense Techniques
• Security Layers
• Network Security
• Endpoint Security
• Application Security
• Data Security
• Cloud Security
Blue Team Tools & Concepts
• EDR (Endpoint Detection & Response)
• NDR (Network Detection & Response)
• IDS / IPS (Intrusion Detection/Prevention System)
• XDR (Extended Detection & Response)
• MDR (Managed Detection & Response)
• SIEM (Security Information & Event Management)
• SOAR (Security Orchestration, Automation & Response)
• UEBA (User & Entity Behavior Analytics)
• DDI (DNS, DHCP, and IPAM)
• Firewall Types & Configurations
• Threat Intelligence Platforms (TIP)
• Vulnerability Management
• Log Analysis & Threat Hunting
• Incident Response Life Cycle
• Security Hardening Techniques