100% found this document useful (1 vote)
128 views

Advance Ethical Hacking Course Contents Updated

This document outlines the contents of a networking and cybersecurity course, including topics like networking fundamentals, devices, topologies, IP addressing, protocols, password cracking, exploitation, post-exploitation, social engineering, web application testing, cloud security, and more. The course aims to provide students with hands-on practical training, recorded lectures, hacking tools, project work, interview preparation, and resources to learn networking, security, and certification topics such as CCNA, OSCP, and CompTIA exams.

Uploaded by

rony rai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
128 views

Advance Ethical Hacking Course Contents Updated

This document outlines the contents of a networking and cybersecurity course, including topics like networking fundamentals, devices, topologies, IP addressing, protocols, password cracking, exploitation, post-exploitation, social engineering, web application testing, cloud security, and more. The course aims to provide students with hands-on practical training, recorded lectures, hacking tools, project work, interview preparation, and resources to learn networking, security, and certification topics such as CCNA, OSCP, and CompTIA exams.

Uploaded by

rony rai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

COURSE

CONTENTS
What is Networking
Why Networking is Important for CEH
Network Topologies
2 tier
3 tier
Spine-leaf
SOHO and Enterprise Network
Types of Network ( LAN, MAN, WAN )
OSI Model
TCP/IP Model

Networking Devices :
Routers
Switch l2 & l3
HUB
Modem
Bridge
Repeater
Interface Cards
Firewalls
@Cyber_security_mumbai
COURSE
CONTENTS
Networking Topologies :
Peer to Peer Model
Client-Server Model
What is Topology
Physical Topology
logical Topology
BUS Topology
RING Topology
STAR Topology
TREE Topology
MESH Topology
HYBRID Topology
IP address
What is IP Address
IPv4 VS IPv6
Private IP and Public IP
Classes of IP Address
Unicast Address
Multicast Address
Broadcast Address
Subnet Mask
Subnetting
Loop Back Address
Link-local Address @Cyber_security_mumbai
COURSE
CONTENTS
What is DHCP and PPPoE
What is DNS
The Host File
What is DDNS
What is NAT
Static Routing and Dynamic routing
Routing Protocols RIP, OSPF, EIGRP , BGP
ICMP and IGMP
FTP
E-mail server and Email Client
Securing E-mail
SMTP , POP3 and IMAP
Telnet and SSH
NETSTAT
What is Access Control
What is AAA
NTP ( Network Time Protocol )
What is IP Tunneling
What is Load Balancing
Wireless Networking
Introduction to 802.11
802.11 standards
@Cyber_security_mumbai
COURSE
CONTENTS
Ethernet
Fast Ethernet
Gigabit Ethernet
10 Gigabit Ethernet
Virtualization
Cloud Computing
Platform as Service(PaaS)
Software as Service(SaaS)
Infrastructure as Service(Iaas)
What is DMZ HOST
What is SNMP
What is Packet Tracer and How to use.
Introduction of CCNA
Some CCNA Concepts

Introduction to penetration testing


Setting up lab
Linux Basics commands

@Cyber_security_mumbai
COURSE
CONTENTS
Vulnerability analysis
Common Vulnerabilities & Exposures
Vulnerability Assessment Phases

Recon & Foot Printing :

Network scanning & footprinting tools


Nmap basics to advanced
Networking tools
What is wireshark
wireshark filters
Analyzing traffic through wireshark
other networking tools

Password Cracking :
Introduction to Password Cracking
Password Guessing Techniques
Identify Hashes
Dictionary Attack , Bruteforce Attack
and Rainbow Attack.

@Cyber_security_mumbai
COURSE
CONTENTS
Password cracking tools.
Hydra basics to advanced
Hashcat basics to advanced
Ophcrack basics to advance

Understanding Sniffing & Spoofing :


What is Sniffing
MAC Attacks and MAC Spoofing Attack.
DHCP Attacks ( DHCP Starvation Attack )
ARP Poisoning Attack.
DNS Poisoning Attack
Password Sniffing

Understanding Social Engineering :


Overview of Social Engineering
Human-based Social Engineering
Computer-based Social Engineering Social
Engineering on Comptia S+ Level
Social Engineering Activities

@Cyber_security_mumbai
COURSE
CONTENTS
Exploitation Using Metasploit :
Introduction to Metaspolit
Auxiliary Modules
Payload Modules
Exploit Modules
Encoder Modules
Post Modules
Payload creation using MSFvenom
Staged vs Non-Staged Payloads
Meterpreter Payloads
Understanding MSFconsole
Post-Exploitation with Metasploit
Core Post-Exploitation Features
Migrating Processes

Post Exploitation :
Post-Exploitation Modules
Pivoting with the Metasploit Framework
Metasploit Automation

@Cyber_security_mumbai
COURSE
CONTENTS
DOS & DDOS Attack :
Denial-of-Service & DDOS
Understanding DOS Attack.
Types of DOS Attack.
Ping-of-death.
How to perform DDOS Attack via
Worms and Botnets.

Understanding Session Hijacking :

Session Hijacking
Understanding Cookies Hijacking.
Difference between Session & Cookies
Hijacking.
Application Level Session Hijacking.
Network Level Session Hijacking.

Understanding Web Servers :


Types of Web Servers.
Web Server Attacks.
Web Server Attacks Methodology

@Cyber_security_mumbai
COURSE
CONTENTS
Web Application Pentest :
Web Application Threats.
Owasp top 10 vulnerabilities 2021
Web Application Hacking
Methodology.
Web APIs , Webhooks and Web shells.
Introduction of Bug- Hunting.
How to earn money legally.

Overview on Cloud Computing


Understanding Cloud Computing.
Cloud Computing Threats.
Cloud Computing Security.
Cloud Computing Services.
Cloud Computing Models.
Cloud Computing Vulnerabilities.
Benefits of Cloud Computing.

@Cyber_security_mumbai
COURSE
CONTENTS

How to be Anonymous :
Anonymous On Internet.
Understanding TOR Browser ( Complete
Concept )
Understanding Proxy chaining.
Kalitorify & nipe.pl
Understanding Whonix Gateway.
Understanding User Agent Finger Printing.

Other Topics :

Honey Pot
Low Hanger Bugs
Host header attack
Parameter pollution
No Rate Limit

@Cyber_security_mumbai
COURSE
CONTENTS
Understanding OSINT
Understanding Reverse Engineering
Understanding Computer Forensics
Understanding Web application Pentesting
Understanding Comptia N +
Understanding Comptia A +
Understanding Comptia S +
Understanding CCNA
Understanding MCSA
Understanding OSCP

What you will get :-


Live practical training on google meet
Recorded Lectures for revision
Hacking Tools, blogs, eBooks etc
Live Hand's on project
Interview Training
Resume Preparation

@Cyber_security_mumbai

You might also like