The Complete Guide for Cyber Security

By RANS ENTERPRISES
$265
Subjects:
Cyber Security, Fundamental Cyber Security, Ethical hacking, Pen testing, Vulnerability Assessment and Penetration Testing
Level:
Beginner, Intermediate, Expert, Bachelors/Undergraduate, Adult/Casual learning
Types:
Printable, Professional Development, E-book, PDF Guide
Language used:
English

The Complete guide/ COURSE for Certification in Ethical Hacking covering from basics to Penetration Testing

vulnerabilities..,Exploitation, VAPT reporting Scope Analysis, Security Test strategy , Estimation, Remediation, False Positive Analysis & Reporting, CVE

PRE-REQUISITE: No pre-requisite , covers all required basics Like OS & Computer Networks etc... Laptop with
minimum 4GB RAM (8GB recommended)and 300 GB Hard disk for Lab practice (need kali linux, metasploitable linux, ISO windows7 for exploitation modules)

  1. What is Hacking
  2. Real Hacker vs. Ethical Hacker
  3. Principles of Information Security
  4. Types of Hackers
  5. Client Server Communication
  6. Computer, Ports, Examples, HTTP,HTTPS
  7. Vulnerability, Defect, Severity, Priority
  8. SDLC- Software Development Life Cycle
  9. Vulnerability flow ,payloads, File uploads-using kali Linux, ASSET, THREAT, RISK
  10. IP , IP4 TYPES, IP6, VPN, DHCP, DNS, SMTP, NAT, ARP, proxy
  11. Phases of Penetration Testing / Pen testing / VAPT, TYPES
  12. WEB technologies , click jacking vulnerability, Virtualization
  13. Password Implementation, MFA, Windows Exploitation lab
  14. Reflected XSS, XSS Stored, File uploads, File Inclusion, Command Execution
  15. DB queries , w3 schools for Sql , DATABASE hacking Sql injection vulnerability manual and auto –using sqlmap, blind sql, types, preventions for vulnerability learnt from 10-16
  16. VAPT Tools, real time approach, ZAP, Nikto, BURPSUITE, Brute Force Attack
  17. IDOR-Insecure direct object reference, Privilege Escalation, Session Hijacking, CSRF-Cross site request forgery
  18. DOS & DDOS attack
  19. Computer Networks, OSI ref Model, TCP/IP—MODE, HANDSHAKE, CONNECT SCAN, SYN SCAN, Flags,UDP
  20. NMAP, DOS, HPING3 DOS
  21. CRYPTOGRAPHY , Prevention of DOS & DDOS
  22. VAPT reporting, CVE, OWASP TOP10, PCI-DSS, GPDR

No reviews yet.