Uploaded by JoJo Vai

Darun IT Paid Ethical Hacking and Cyber Security Course Outline

advertisement
PAID ETHICAL HACKING AND CYBER SECURITY
COURSE OUTLINE
Day 1 , 2
Tracking A Person Location
Information Gathering
 Osint( image search )
 IP Tracking
Get Victim Information Via image searchin
Get Geolocation Via Phishing link Using
Seeker and Online tools ( Location Track )
Day 3 , 4
Secure Your Information From Hacker
Basic Cryptography
Symmetric Key Cryptography
Asymmetric Key Cryptography
Hash Function Cryptography
Hide or Secure your information
using Cryptography
Day 5 , 6
Secure Your Information From Hacker
Basic Steganography
Hide your Information inside of Image
Extract Victim Information from Image
Extract Victim Information from Audio
Day 7
Networking and Wi-Fi Hacking
Basic Networking
(G)
Day 8 , 9
Networking and Wi-Fi Hacking
Advanced Wifi Hacking
Brute Force Attack (G)
Day 10
Networking and Wi-Fi Hacking
Networking Hacking Via
DNS Attack (G)
Day 11
Networking and Wi-Fi Hacking
Wireless network
Hacking with automating redirection (G)
Day 12
Hacking Using Metasploit
Basic Use Of Mestploit
Basic Metasploit (G)
Modules Explained
Day 13
Hacking Using Metasploit
Vulnerability researching by Metasploit
Virus Creating (G)
Day 14
Hacking Using Metasploit
Windows 10 Hacking by Metasploit
(G)
Day 15
Hacking Using Metasploit
Android Hacking by Metasploit
(G)
Day 16 , 17
Hacking Using Metasploit
Hacking Using Steganography
(G)
Binding payload
messages and data behind images
videos and apk
Day 18
DIGITAL FORENSICS
Digital Forensics


1
File Signature (F)
Open bad format file via analyzing file magic numbers or
file signatures
Day 19
DIGITAL FORENSICS
Digital Forensics
2
 Wire shark Class 1 ( G)
Monitoring or Analyzing Different protocol ( Packet Capture file ) using
wire shark
Day 20
DIGITAL FORENSICS
Digital Forensics
3
 Wire shark Class 1 ( G)
Monitoring or Analyzing Different protocol ( Packet Capture file ) using
wire shark
Day 21
DIGITAL FORENSICS
Digital Forensics
3
Data Retrieve using Autopsy (F)
Recover Data from Pendrive
Memory Using Autopsy
Day 22
Website Hacking
Basic Web
IP
Server
Protocol
Domain Name
IP Classic
Server
Protocol Types
Port Scanning using Nmap
Rust scan
Day 23
Website Hacking
What is website hacking and how to work it (S)
Day 24
Website Hacking
Instrument and requirements for website hacking (S)
Day 25
Website Hacking
What is sql injection and dump website data using sql injection (S)
Day 26
Website Hacking
What is xss and how to xss work (S)
Day 27
Website Hacking
OWASP Top Vulnerabilities
OS Injection
(F)
Day 28
Website Hacking
LFI
RFI (F)
Day 29
Website Hacking
IDOR Vulnerabilities Using Burp Suite (F)
Day 30
Website Hacking
Cookies Stolen
(F)
Day 31
Website Hacking
Brute Force Attack Using Hydra
Login page Username & Password Hacked
SSH Username & Password Hacked
FTP username & password(F)
Day 32
Website Hacking
What is file upload vulnerability
and How it work (S)
Day 33
Website Hacking
What is php shell and uses of shell (S)
Day 34 , 35
Website Hacking
Shell Uploading and Privilege Escalation ( F )
Upload Web shell
Reverse Shell On Target Website
Get Control of Admin or Root Via Privilege Escalation
Day 36 , 37
Learn Hacking With Mobile
Website hacking basic with Mobile Phone
Google Dorking For get Information About target or Victim Website
SQL Injection
XSS (S)
Day 38
Learn Hacking With Mobile
Social media account cracking with mobile phone (S)
Day 39 , 40
Learn Hacking With Mobile
What is termux
Using termux and important tools review (S)
Day 41 , 42
Python Programming For Ethical Hacking
Python For Ethical Hacking And Python Environment Configure
(G)
Day 43-47
Python Programming For Ethical Hacking
Python Basic
Loop
Function
Conditional Statements
Python Data Structure ) (G)
Day 48
Python Programming For Ethical Hacking
Object Oriented
Python (G)
Day 49
Python Programming For Ethical Hacking
Modules
Importing Packages
(G)
Day 50
Python Programming For Ethical Hacking
Create Domain to IP Convertor Tools
Using Python (F)
Day 51
Python Programming For Ethical Hacking
Create Port Scanner ( Like Nmap or rustscan ) using Python
(F)
Day 52
Python Programming For Ethical Hacking
Create Source code Downloader Tools
Using Python (F)
Day 53
Python Programming For Ethical Hacking
Socket programming for making hacking tools (G)
Day 54
Python Programming For Ethical Hacking
Create Keylogger Tools Using Python (G)
Day 55
Python Programming For Ethical Hacking
DNS Spoofing Using Python
(G)
Day 56
Python Programming For Ethical Hacking
Create Backdoor Using
Python (G)
BONUS
Introduction with Bug-Bounty
Freelancing
CTF
THANK YOU
Download