0% found this document useful (0 votes)
55 views4 pages

Module 1

Uploaded by

jsusomebody
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views4 pages

Module 1

Uploaded by

jsusomebody
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Module 1 :- Introduction to Cyber Security

• What is Cyber Security


• Domain Inside Cyber Security
• Offensive & Defensive Career in Cyber Security
° Type of Hackers
• Hacker Skills Set
• Hacking Phases & Cyber Kill chain
• CIA Traid

Module 2 :- Networking Refresher


• Internet & IP address
• OSI model
• TCP/IP
• TCP/UDP
• Hardware Devices
• Network Topology
• MAC Address
• Packets & Frames
• Domain Name System (DNS)
• Network Protocol
• Firewere Devices
• DMZ

Module 3 :- Linux Fundamental


• Linux History
• Basic Commands
• File System
• Shell Operators
• File Permission
• Text Editor
• Package Management
• System Logs

Module 4 :- Windows Fundamental


• File System
• Windows/System32 Folder
• User account/profile/permission
• User account control
• Setting and control panel
• Task Manager
• Computer Management
• CMD
• System Information
• Registry editor
Module 5 :- OS Internals
• Understand CPU
• CPU Register
• CPU Flags
• Memory & It's anatomy
• Stack
• Heap
• ASLR

Module 6 :- Data Flow & Manipulation


• What is Encryption
• Symmetric Encryption
• Asymmetric Encryption
• RSA Encryption
• AES Encryption
• What is Hashing
• MD5 hashing
• SHA Hashing
• What is Encoding
• Base64 Encoding
• URL Encoding
• Hex Encoding

Module 7 :- Information Gathering


• Types of Information Gathering
• DNS Recon
• Source code Analysis
• Whois Lookup
• WAF Lookup
• Sub Domain Enumeration
• Technology Detection
• Google Dorking
• Mail Footprinting
• Content Discovery

Module 8 :- Network Scanning


• Scanning Introduction
• Network Mapping
• Host Discovery
• Port Scanning
• Service Scanning
• Banner Grabbing
• OS Detection
Module 9 :- Enumerating Network
• FTP Enumeration
• SMB Enumeration
• SSH Enumeration
• RDP Enumeration
• SMTP Enumeration

Module 10 :- Exploiting Web Server


• The OWASP top 10
• File Inclusion Exploit
• SQL injection
• XSS
• IDOR
• RCE
• CSRF

Module 11 :- Exploiting Host/System


• FTP Exploitation
• SSH Exploitation
• RDP Exploitation
• WinRM Exploitation
• WebDav Exploitation

Module 12 :- Post Exploitation


• What is Post Exploitation
• Local Enumeration - Windows
• Local Enumeration - Linux
• Dumping Hash - Windows & Linux
• Windows Privilege Escalation - Service Exploit & Access Token Impersonation
• Linux Privilege Escalation - Sudo , SUID , Service , Karnel Exploit
• Persistencing Windows - Startup & Registry , RDP
• Persistencing Linux - SSH , Bashrc , Server Backdooring
• Lateral Movement - PTH , Psexec,CME
• Pivoting - SSH Tunneling, Socks Proxy
• Covering Tracks - Clear event & System Logs

Module 13 :- Social Engineering Attacks


• What is Social Engineering
• SMS Spoofing Anatomy
• Mail Spoofing Anatomy
• Social Engineering toolkit
• Phishing Attack
• Browser Exploitation via Beef
• HTA Macros Exploit

many more surprise topics

You might also like