Advance Ethical Hacking Course Contents Updated
Advance Ethical Hacking Course Contents Updated
CONTENTS
What is Networking
Why Networking is Important for CEH
Network Topologies
2 tier
3 tier
Spine-leaf
SOHO and Enterprise Network
Types of Network ( LAN, MAN, WAN )
OSI Model
TCP/IP Model
Networking Devices :
Routers
Switch l2 & l3
HUB
Modem
Bridge
Repeater
Interface Cards
Firewalls
@Cyber_security_mumbai
COURSE
CONTENTS
Networking Topologies :
Peer to Peer Model
Client-Server Model
What is Topology
Physical Topology
logical Topology
BUS Topology
RING Topology
STAR Topology
TREE Topology
MESH Topology
HYBRID Topology
IP address
What is IP Address
IPv4 VS IPv6
Private IP and Public IP
Classes of IP Address
Unicast Address
Multicast Address
Broadcast Address
Subnet Mask
Subnetting
Loop Back Address
Link-local Address @Cyber_security_mumbai
COURSE
CONTENTS
What is DHCP and PPPoE
What is DNS
The Host File
What is DDNS
What is NAT
Static Routing and Dynamic routing
Routing Protocols RIP, OSPF, EIGRP , BGP
ICMP and IGMP
FTP
E-mail server and Email Client
Securing E-mail
SMTP , POP3 and IMAP
Telnet and SSH
NETSTAT
What is Access Control
What is AAA
NTP ( Network Time Protocol )
What is IP Tunneling
What is Load Balancing
Wireless Networking
Introduction to 802.11
802.11 standards
@Cyber_security_mumbai
COURSE
CONTENTS
Ethernet
Fast Ethernet
Gigabit Ethernet
10 Gigabit Ethernet
Virtualization
Cloud Computing
Platform as Service(PaaS)
Software as Service(SaaS)
Infrastructure as Service(Iaas)
What is DMZ HOST
What is SNMP
What is Packet Tracer and How to use.
Introduction of CCNA
Some CCNA Concepts
@Cyber_security_mumbai
COURSE
CONTENTS
Vulnerability analysis
Common Vulnerabilities & Exposures
Vulnerability Assessment Phases
Password Cracking :
Introduction to Password Cracking
Password Guessing Techniques
Identify Hashes
Dictionary Attack , Bruteforce Attack
and Rainbow Attack.
@Cyber_security_mumbai
COURSE
CONTENTS
Password cracking tools.
Hydra basics to advanced
Hashcat basics to advanced
Ophcrack basics to advance
@Cyber_security_mumbai
COURSE
CONTENTS
Exploitation Using Metasploit :
Introduction to Metaspolit
Auxiliary Modules
Payload Modules
Exploit Modules
Encoder Modules
Post Modules
Payload creation using MSFvenom
Staged vs Non-Staged Payloads
Meterpreter Payloads
Understanding MSFconsole
Post-Exploitation with Metasploit
Core Post-Exploitation Features
Migrating Processes
Post Exploitation :
Post-Exploitation Modules
Pivoting with the Metasploit Framework
Metasploit Automation
@Cyber_security_mumbai
COURSE
CONTENTS
DOS & DDOS Attack :
Denial-of-Service & DDOS
Understanding DOS Attack.
Types of DOS Attack.
Ping-of-death.
How to perform DDOS Attack via
Worms and Botnets.
Session Hijacking
Understanding Cookies Hijacking.
Difference between Session & Cookies
Hijacking.
Application Level Session Hijacking.
Network Level Session Hijacking.
@Cyber_security_mumbai
COURSE
CONTENTS
Web Application Pentest :
Web Application Threats.
Owasp top 10 vulnerabilities 2021
Web Application Hacking
Methodology.
Web APIs , Webhooks and Web shells.
Introduction of Bug- Hunting.
How to earn money legally.
@Cyber_security_mumbai
COURSE
CONTENTS
How to be Anonymous :
Anonymous On Internet.
Understanding TOR Browser ( Complete
Concept )
Understanding Proxy chaining.
Kalitorify & nipe.pl
Understanding Whonix Gateway.
Understanding User Agent Finger Printing.
Other Topics :
Honey Pot
Low Hanger Bugs
Host header attack
Parameter pollution
No Rate Limit
@Cyber_security_mumbai
COURSE
CONTENTS
Understanding OSINT
Understanding Reverse Engineering
Understanding Computer Forensics
Understanding Web application Pentesting
Understanding Comptia N +
Understanding Comptia A +
Understanding Comptia S +
Understanding CCNA
Understanding MCSA
Understanding OSCP
@Cyber_security_mumbai