1 | Introduction to Ethical Hacking | Hacker types, pentesting phases, legal concerns, certifications (CEH, OSCP) |
2 | Networking Fundamentals for Hackers | OSI/TCP-IP models, MAC/IP/DNS/NAT, Wireshark basics |
3 | Footprinting & Reconnaissance | Passive & active recon, OSINT, WHOIS, Google dorking, Shodan |
4 | Scanning Networks | Nmap, Zenmap, service & port scanning |
5 | Enumeration Techniques | DNS, SMB, SNMP, NetBIOS, tools like enum4linux, nbtscan |
6 | Vulnerability Scanning | CVE/NVD usage, scanning with Nessus/OpenVAS |
7 | System Hacking Basics | Hash cracking, brute force, privilege escalation |
8 | Metasploit Framework I | Architecture, modules, scanning, basic exploits |
9 | Metasploit Framework II | Payload crafting, post-exploitation, persistence |
10 | Packet Analysis & Sniffing | Wireshark, tcpdump, sniffing passwords |
11 | Man-in-the-Middle Attacks | ARP spoofing, DNS spoofing, SSL stripping |
12 | Password & Credential Attacks | Hash extraction, brute force, dictionary attacks |
13 | WiFi Hacking | WPA2 cracking, Evil Twin, rogue APs, tools: Aircrack-ng, Wifite |
14 | Web Hacking I (OWASP Top 10) | Input validation, auth bypass, insecure direct object references |
15 | Web Hacking II | SQLi, XSS, CSRF, directory traversal |
16 | Advanced Web Exploits | SSRF, RCE, XXE, host header injection using Burp and custom scripts |
17 | Mobile Security Fundamentals | Android/iOS threat landscape, etc. |
18 | Post-Exploitation Techniques | Maintaining access, log cleaning, Meterpreter |
19 | Privilege Escalation | Linux/Windows privilege escalation, LinPEAS, WinPEAS |
20 | Cloud Security Fundamentals | Shared responsibility model, IAM, cloud threats, case studies |
21 | Cloud Security Threats & Best Practices | APIs, misconfigs, monitoring, Zero Trust, secure architecture |
info@geeks-hub.com
© Copy Rights – Geeks Hub 2024