0% found this document useful (0 votes)
44 views4 pages

Module 1

Uploaded by

jsusomebody
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views4 pages

Module 1

Uploaded by

jsusomebody
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Module 1 :- Introduction to Cyber Security

• What is Cyber Security


• Domain Inside Cyber Security
• Offensive & Defensive Career in Cyber Security
° Type of Hackers
• Hacker Skills Set
• Hacking Phases & Cyber Kill chain
• CIA Traid

Module 2 :- Networking Refresher


• Internet & IP address
• OSI model
• TCP/IP
• TCP/UDP
• Hardware Devices
• Network Topology
• MAC Address
• Packets & Frames
• Domain Name System (DNS)
• Network Protocol
• Firewere Devices
• DMZ

Module 3 :- Linux Fundamental


• Linux History
• Basic Commands
• File System
• Shell Operators
• File Permission
• Text Editor
• Package Management
• System Logs

Module 4 :- Windows Fundamental


• File System
• Windows/System32 Folder
• User account/profile/permission
• User account control
• Setting and control panel
• Task Manager
• Computer Management
• CMD
• System Information
• Registry editor
Module 5 :- OS Internals
• Understand CPU
• CPU Register
• CPU Flags
• Memory & It's anatomy
• Stack
• Heap
• ASLR

Module 6 :- Data Flow & Manipulation


• What is Encryption
• Symmetric Encryption
• Asymmetric Encryption
• RSA Encryption
• AES Encryption
• What is Hashing
• MD5 hashing
• SHA Hashing
• What is Encoding
• Base64 Encoding
• URL Encoding
• Hex Encoding

Module 7 :- Information Gathering


• Types of Information Gathering
• DNS Recon
• Source code Analysis
• Whois Lookup
• WAF Lookup
• Sub Domain Enumeration
• Technology Detection
• Google Dorking
• Mail Footprinting
• Content Discovery

Module 8 :- Network Scanning


• Scanning Introduction
• Network Mapping
• Host Discovery
• Port Scanning
• Service Scanning
• Banner Grabbing
• OS Detection
Module 9 :- Enumerating Network
• FTP Enumeration
• SMB Enumeration
• SSH Enumeration
• RDP Enumeration
• SMTP Enumeration

Module 10 :- Exploiting Web Server


• The OWASP top 10
• File Inclusion Exploit
• SQL injection
• XSS
• IDOR
• RCE
• CSRF

Module 11 :- Exploiting Host/System


• FTP Exploitation
• SSH Exploitation
• RDP Exploitation
• WinRM Exploitation
• WebDav Exploitation

Module 12 :- Post Exploitation


• What is Post Exploitation
• Local Enumeration - Windows
• Local Enumeration - Linux
• Dumping Hash - Windows & Linux
• Windows Privilege Escalation - Service Exploit & Access Token Impersonation
• Linux Privilege Escalation - Sudo , SUID , Service , Karnel Exploit
• Persistencing Windows - Startup & Registry , RDP
• Persistencing Linux - SSH , Bashrc , Server Backdooring
• Lateral Movement - PTH , Psexec,CME
• Pivoting - SSH Tunneling, Socks Proxy
• Covering Tracks - Clear event & System Logs

Module 13 :- Social Engineering Attacks


• What is Social Engineering
• SMS Spoofing Anatomy
• Mail Spoofing Anatomy
• Social Engineering toolkit
• Phishing Attack
• Browser Exploitation via Beef
• HTA Macros Exploit

many more surprise topics

You might also like