Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
10 views3 pages

Ethical Hacking

The Ethical Hacking Course Syllabus by Researcher Yuvi covers a comprehensive range of topics including the fundamentals of ethical hacking, setting up a hacking environment, computer networking, social engineering techniques, and various hacking attacks. It includes modules on penetration testing, web vulnerabilities, advanced hacking techniques, and the role of AI in hacking, as well as an introduction to the dark web and cybercrime investigation. The course aims to equip participants with practical skills and knowledge for ethical hacking and cybersecurity.

Uploaded by

Hey Ummm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views3 pages

Ethical Hacking

The Ethical Hacking Course Syllabus by Researcher Yuvi covers a comprehensive range of topics including the fundamentals of ethical hacking, setting up a hacking environment, computer networking, social engineering techniques, and various hacking attacks. It includes modules on penetration testing, web vulnerabilities, advanced hacking techniques, and the role of AI in hacking, as well as an introduction to the dark web and cybercrime investigation. The course aims to equip participants with practical skills and knowledge for ethical hacking and cybersecurity.

Uploaded by

Hey Ummm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Ethical Hacking Course Syllabus By Researcher Yuvi

Module 1: Introduction to Ethical Hacking


 Introduction to Ethical Hacking and Its Stages
 CIA Triad: Introduction in Cyber Security

Module 2: Setting Up the Hacking Environment


 Setting up a hacking environment on a computer
 Linux and Basics of Operating Systems

Module 3: Computer Networking Fundamentals


 WAN, LAN, and MAC Address
 IP Concepts: Static IP, Dynamic IP, Public IP, Local IP
 Ports and Protocols
 Network Fundamentals

Module 4: Social Engineering and Basic Hacking Techniques


 Phishing: Using Zphisher
 Password Cracking: Brute Force Concept with Practical
 Call Bombing and SMS Bombing

Module 5: Wireless Hacking Attacks


 WiFi Deauthentication: Practical Tutorial
 WPA2 Cracking
 Evil Twin Attack

Module 6: Browser Exploitation


 BeEF Framework: Browser Exploitation Tutorial

Ethical Hacking as a Penetration Tester

Module 7: Penetration Testing Basics


 Introduction to Penetration Testing
 Web Application Testing
 Network Testing
Module 8: Footprinting and Reconnaissance
 Footprinting Concepts
 Footprinting through Search Engines
 DNS Footprinting
 Footprinting through Social Networking Sites
 WHOIS Footprinting
 Reconnaissance Techniques
 Domain and Subdomain Finding (Manual and Automated Tools)
 Directory Bruteforce (Manual and Automated)

Module 9: Web Vulnerabilities


 OWASP Top 10
 Web Applications: Client Browser and Web Server Working
 Tools: Burp Suite Pro and Web Exploitation Tools
 DVWA Lab Solving

Module 10: Client-Side Vulnerabilities


 DoS/DDoS Attacks: Using Botnets
 Cross-Site Scripting (XSS): Reflected, Stored, and DOM-Based
 Command Injection
 File Upload Vulnerabilities
 CSRF (Cross-Site Request Forgery)
 SQL Injection Basics

Module 11: Advanced Hacking Techniques


 Google Dorking
 Sensitive Data Exposure

Module 12: Report Writing and AI in Hacking


 Writing Professional Penetration Testing Reports
 AI in Hacking
 Customizing AI Tools
 Using Whiterabbit AI

Dark Web and Cyber Investigation

Module 13: Introduction to Dark Web and Anonymity


 Anonymity Concepts
 IP Changing, MAC Changing
 Defenses: DNS Leak, WebRTC Protection

Module 14: Dark Web Exploration


 Basics of Dark Web Navigation

Module 15: Cybercrime Investigation


 Cybercrime Laws: Indian IT Act 2000 (Basics)

You might also like