COURSE
CONTENTS
What is Networking
Why Networking is Important for CEH
Network Topologies
2 tier
3 tier
Spine-leaf
SOHO and Enterprise Network
Types of Network ( LAN, MAN, WAN )
OSI Model
TCP/IP Model
Networking Devices :
Routers
Switch l2 & l3
HUB
Modem
Bridge
Repeater
Interface Cards
Firewalls
@Cyber_security_mumbai
COURSE
CONTENTS
Networking Topologies :
Peer to Peer Model
Client-Server Model
What is Topology
Physical Topology
logical Topology
BUS Topology
RING Topology
STAR Topology
TREE Topology
MESH Topology
HYBRID Topology
IP address
What is IP Address
IPv4 VS IPv6
Private IP and Public IP
Classes of IP Address
Unicast Address
Multicast Address
Broadcast Address
Subnet Mask
Subnetting
Loop Back Address
Link-local Address @Cyber_security_mumbai
COURSE
CONTENTS
What is DHCP and PPPoE
What is DNS
The Host File
What is DDNS
What is NAT
Static Routing and Dynamic routing
Routing Protocols RIP, OSPF, EIGRP , BGP
ICMP and IGMP
FTP
E-mail server and Email Client
Securing E-mail
SMTP , POP3 and IMAP
Telnet and SSH
NETSTAT
What is Access Control
What is AAA
NTP ( Network Time Protocol )
What is IP Tunneling
What is Load Balancing
Wireless Networking
Introduction to 802.11
802.11 standards
@Cyber_security_mumbai
COURSE
CONTENTS
Ethernet
Fast Ethernet
Gigabit Ethernet
10 Gigabit Ethernet
Virtualization
Cloud Computing
Platform as Service(PaaS)
Software as Service(SaaS)
Infrastructure as Service(Iaas)
What is DMZ HOST
What is SNMP
What is Packet Tracer and How to use.
Introduction of CCNA
Some CCNA Concepts
Introduction to penetration testing
Setting up lab
Linux Basics commands
@Cyber_security_mumbai
COURSE
CONTENTS
Vulnerability analysis
Common Vulnerabilities & Exposures
Vulnerability Assessment Phases
Recon & Foot Printing :
Network scanning & footprinting tools
Nmap basics to advanced
Networking tools
What is wireshark
wireshark filters
Analyzing traffic through wireshark
other networking tools
Password Cracking :
Introduction to Password Cracking
Password Guessing Techniques
Identify Hashes
Dictionary Attack , Bruteforce Attack
and Rainbow Attack.
@Cyber_security_mumbai
COURSE
CONTENTS
Password cracking tools.
Hydra basics to advanced
Hashcat basics to advanced
Ophcrack basics to advance
Understanding Sniffing & Spoofing :
What is Sniffing
MAC Attacks and MAC Spoofing Attack.
DHCP Attacks ( DHCP Starvation Attack )
ARP Poisoning Attack.
DNS Poisoning Attack
Password Sniffing
Understanding Social Engineering :
Overview of Social Engineering
Human-based Social Engineering
Computer-based Social Engineering Social
Engineering on Comptia S+ Level
Social Engineering Activities
@Cyber_security_mumbai
COURSE
CONTENTS
Exploitation Using Metasploit :
Introduction to Metaspolit
Auxiliary Modules
Payload Modules
Exploit Modules
Encoder Modules
Post Modules
Payload creation using MSFvenom
Staged vs Non-Staged Payloads
Meterpreter Payloads
Understanding MSFconsole
Post-Exploitation with Metasploit
Core Post-Exploitation Features
Migrating Processes
Post Exploitation :
Post-Exploitation Modules
Pivoting with the Metasploit Framework
Metasploit Automation
@Cyber_security_mumbai
COURSE
CONTENTS
DOS & DDOS Attack :
Denial-of-Service & DDOS
Understanding DOS Attack.
Types of DOS Attack.
Ping-of-death.
How to perform DDOS Attack via
Worms and Botnets.
Understanding Session Hijacking :
Session Hijacking
Understanding Cookies Hijacking.
Difference between Session & Cookies
Hijacking.
Application Level Session Hijacking.
Network Level Session Hijacking.
Understanding Web Servers :
Types of Web Servers.
Web Server Attacks.
Web Server Attacks Methodology
@Cyber_security_mumbai
COURSE
CONTENTS
Web Application Pentest :
Web Application Threats.
Owasp top 10 vulnerabilities 2021
Web Application Hacking
Methodology.
Web APIs , Webhooks and Web shells.
Introduction of Bug- Hunting.
How to earn money legally.
Overview on Cloud Computing
Understanding Cloud Computing.
Cloud Computing Threats.
Cloud Computing Security.
Cloud Computing Services.
Cloud Computing Models.
Cloud Computing Vulnerabilities.
Benefits of Cloud Computing.
@Cyber_security_mumbai
COURSE
CONTENTS
How to be Anonymous :
Anonymous On Internet.
Understanding TOR Browser ( Complete
Concept )
Understanding Proxy chaining.
Kalitorify & nipe.pl
Understanding Whonix Gateway.
Understanding User Agent Finger Printing.
Other Topics :
Honey Pot
Low Hanger Bugs
Host header attack
Parameter pollution
No Rate Limit
@Cyber_security_mumbai
COURSE
CONTENTS
Understanding OSINT
Understanding Reverse Engineering
Understanding Computer Forensics
Understanding Web application Pentesting
Understanding Comptia N +
Understanding Comptia A +
Understanding Comptia S +
Understanding CCNA
Understanding MCSA
Understanding OSCP
What you will get :-
Live practical training on google meet
Recorded Lectures for revision
Hacking Tools, blogs, eBooks etc
Live Hand's on project
Interview Training
Resume Preparation
@Cyber_security_mumbai