Module 1 :- Introduction to Cyber Security
• What is Cyber Security
• Domain Inside Cyber Security
• Offensive & Defensive Career in Cyber Security
° Type of Hackers
• Hacker Skills Set
• Hacking Phases & Cyber Kill chain
• CIA Traid
Module 2 :- Networking Refresher
• Internet & IP address
• OSI model
• TCP/IP
• TCP/UDP
• Hardware Devices
• Network Topology
• MAC Address
• Packets & Frames
• Domain Name System (DNS)
• Network Protocol
• Firewere Devices
• DMZ
Module 3 :- Linux Fundamental
• Linux History
• Basic Commands
• File System
• Shell Operators
• File Permission
• Text Editor
• Package Management
• System Logs
Module 4 :- Windows Fundamental
• File System
• Windows/System32 Folder
• User account/profile/permission
• User account control
• Setting and control panel
• Task Manager
• Computer Management
• CMD
• System Information
• Registry editor
Module 5 :- OS Internals
• Understand CPU
• CPU Register
• CPU Flags
• Memory & It's anatomy
• Stack
• Heap
• ASLR
Module 6 :- Data Flow & Manipulation
• What is Encryption
• Symmetric Encryption
• Asymmetric Encryption
• RSA Encryption
• AES Encryption
• What is Hashing
• MD5 hashing
• SHA Hashing
• What is Encoding
• Base64 Encoding
• URL Encoding
• Hex Encoding
Module 7 :- Information Gathering
• Types of Information Gathering
• DNS Recon
• Source code Analysis
• Whois Lookup
• WAF Lookup
• Sub Domain Enumeration
• Technology Detection
• Google Dorking
• Mail Footprinting
• Content Discovery
Module 8 :- Network Scanning
• Scanning Introduction
• Network Mapping
• Host Discovery
• Port Scanning
• Service Scanning
• Banner Grabbing
• OS Detection
Module 9 :- Enumerating Network
• FTP Enumeration
• SMB Enumeration
• SSH Enumeration
• RDP Enumeration
• SMTP Enumeration
Module 10 :- Exploiting Web Server
• The OWASP top 10
• File Inclusion Exploit
• SQL injection
• XSS
• IDOR
• RCE
• CSRF
Module 11 :- Exploiting Host/System
• FTP Exploitation
• SSH Exploitation
• RDP Exploitation
• WinRM Exploitation
• WebDav Exploitation
Module 12 :- Post Exploitation
• What is Post Exploitation
• Local Enumeration - Windows
• Local Enumeration - Linux
• Dumping Hash - Windows & Linux
• Windows Privilege Escalation - Service Exploit & Access Token Impersonation
• Linux Privilege Escalation - Sudo , SUID , Service , Karnel Exploit
• Persistencing Windows - Startup & Registry , RDP
• Persistencing Linux - SSH , Bashrc , Server Backdooring
• Lateral Movement - PTH , Psexec,CME
• Pivoting - SSH Tunneling, Socks Proxy
• Covering Tracks - Clear event & System Logs
Module 13 :- Social Engineering Attacks
• What is Social Engineering
• SMS Spoofing Anatomy
• Mail Spoofing Anatomy
• Social Engineering toolkit
• Phishing Attack
• Browser Exploitation via Beef
• HTA Macros Exploit
many more surprise topics