Introduction to cyber security
- What is cyber security
- Terminologies of cyber security
- Cia triad
- Cyber laws
- Rules and ethics
Building virtual lab for pen test
- What is virtualization
- Needs of virtualization
- Virtual machine installation
- Windows xp installation in virtual machine
- Windows 7 installation in virtual machine
- Kali linux installation in virtual machine
The kali linux
- Introduction to kali linux
- Basic command for kali linux
Introduction to vapt
- What is vapt
- Active attack
- Passive attack
Footprinting and reconnaissance
- What is information gathering
- Types of footprinting and reconnaissance
- Introduction to search engine footprinting
- Practical on search engine footprinting
- Introduction to email footprinting
- Practical on email footprinting
- Introduction to dns footprinting
- Practical on dns footprinting
- Introduction to network footprinting
- Practical on network footprinting
- Introduction to competitive intelligence footprinting
- Practical on competitive intelligence footprinting
- Introduction to social engineering footprinting
- Practical on social engineering footprinting
- Introduction to social networking sites footprinting
- Practical on social networking footprinting
- Introduction to whois footprinting
- Practical on whois footprinting
- Introduction to advanced google hacking techniques footprinting
- Practical on advanced google hacking techniques footprinting
- Introduction to website footprinting
- Practical on website footprinting
Scanning
- introduction to scanning
- 3 way handshake
- Introduction to tcp and udp
- Flags in tcp
- Methodologies of scanning
- Network vulnerable scanning
- Website vulnerable scanning
Gaining access
- Introduction to gaining access
- Server side and client side attacks
- Introduction to sql injection attack
- Practical on sql injection attack
- Introduction to xss attack
- Practical on xss attack
- Directory traversal attack
- Practical on directory traversal attack
Maintaining access
- Introduction to maintaining access
- Introduction to shell uploading
- Practical on shell uploading(backdoor)
Clearing tracks
- Introduction to clearing tracks
- Practical on clearing tracks
report writing on vulnerable