Ethical Hacking Contents
Ethical Hacking Contents
Networking and Ethical Hacking:
1. Introduction to networking
2. Ip address: Ip classes, private and public ip, subnet mask.
3. Networking devices: Router, Switch, Hub, NIC, CSU& DSU, etc..
4. Mac Address, Difference between Mac and ip address.
5. Communication:
a) Wired: Twisted Pair cable, Categories of Twisted Pair, Fiber optic cable
b) Wireless: Wifi, Radio Frequency
6. Cable Design:
a) Cross over cable
b) Straight through cable
c) Roll Over cable
7. Ip address assignment:
a) Manual Ip Assignment
b) DHCP ip assignment, How DHCP Works
8. OSI Model
9. DOD Model
10. Installation of Operating System:
a) Client Operating system
b) Network Operating system
c) Android Operating system
Ethical Hacking:
1. Footprinting and Reconnaisance
2. Scanning Networks
3. Enumeration
4. Vulnerability Analysis
5. System Hacking
6. Malware Threats
7. Sniffing
8. Social Engineering
9. Denial-of-Service
10. Evading IDS, Firewall, and Honeypots
11. Hacking Web Servers
12. Hacking Web Application
13. SQL Injection
14. Introduction for hacking wireless networks