Module 1:Introduction To Ethical Hacking
OverView
Who is hacker
Classification Of Hackers
Phases Of Hacking
Scope Of CyberSecurity
Module 2: Network Basics
Overview
What is Network
IPv4 Addresses
MAC Addresses
The OSI Model
Diffrent Type Network Protocol
Three-Way Handshake
What is Port
Module 3: Setting Up Lab
Overview
Installing Kali Linux [Vbox /Vmware]
What is Purpose Of Kali Linux ?
Exploring Certain Neseccary Tools
Module 4: WebServer
Overview
What is Webserver ?
How the Web works ?
Setting Up WebServer.
Different Type protocols and http Methods.
Module 5:Reconnassiance & Scanning
Overview of Reconnassiance
What is Reconnassiance ?
Different Type Of Reconnassiance ?
What is the Purpose ?
Overview ofScanning
Nmap
Different Type Of Nmap Scanning
Module 6: Hacking Webserver
Overview
Identifying Webserver
Checking Webserver is Vulnerable
Exploiting Webserver
Writing Report
Module 7:Web Application Penetration Testing
Overview
Introduction
Setting Up Lab For WebApplicationPenetration Testing
Installing Burpsuite
Burp Basics: configuring Firefox to trust Burp certificate for man-in-the-middle.
Installing Foxy Proxy
The OWASP Top 10 & OWASP Testing Checklist
Writing Report
Module 8:Social Engineering
Overview
What is Social Engineering
Relevance Of Social Engineering
Human Based Social Engineering
Computer Based Social Engineering
Phishing
(Learn from international achievers)