How to become hacker and how to prepare and what is its syllabus see here.......

E thical Hacking
Syllabus


1st Module : Networking Concept
  1. » How does internet work.
  2. » What is network ?
  3. » Countermeasures of network.
  4. » What is IP and types of IP ?
  5. » What is Mac ?
  6. » What is Cookie and Cache ?
  7. » Domain Name System
    • » DNS Poisoning
    • » o Name Server
  8. » Electronic Mail
    • » Architecture and Services
    • » Mail Access Protocols
    • » Introduction of Ports
  9. » Introduction to Web Browser
  10. » Detail Study on Buffer or Packets
In this module of networking concept, cyber crime awareness society, where we include the details about ip address, mac address, dns etc.
2nd Module : Operating System Concept
  1. » Introduction to Operating System
  2. » Types of Operating System
  3. » Bootstrapping Technology
  4. » Understanding Windows
  5. » Understanding Tokens
  6. » Impersonation Tokens
In the module of operating system concept,the students will also learn about the linux, windows operating system, details about the cookies, cache etc.
3rd Module : Introduction to Ethical Hacking
  1. » What is Ethical Hacking
  2. » Types of Hackers
  3. » Who is a Hacker
  4. » Security Challenges
  5. » Scanning
  6. » Skills required for an Ethical Hacker
  7. » Types of Attacks
  8. » What do Ethical Hackers Do
  9. » Vulnerability Research
  10. » Effects of Hacking
  11. » How can Hacking be Ethical
  12. » Types of Data Stolen from the organisation
  13. » What is Penetration Testing
In this module of ethical hacking introduction,every students will able to learn about the hackers, classes of hacking, types of hackers.
4th Module : Footprinting
  1. » Footprinting Terminologies
  2. » What is Footprinting
  3. » Methods of Footprinting
  4. » Benefits of Footprinting
  5. » People Search
  6. » Who-is-lookup
  7. » DNS Lookup
  8. » Analyzing Email Headers
  9. » Extracting DNs Information
  10. » Traceroute
  11. » Mirroring Websites
  12. » Extracting Website Informations
  13. » Tracking Users
  14. » Tracking Emails Communications
  15. » Tracking Mobile Communications
  16. » Mobile Communications Countermeasures
In the module of footprinting, which is called information gathering, where the students to collect information about the target.
5th Module : Google Hacking
  1. » What a hacker Do using Google Hacking
  2. » Footprinting using Google Hacking Technique
  3. » Google Advance Search Operators
In this module of google hacking, students will able to learn about the google searching operators.
6th Module : Scanning Network
  1. » Types of Scanning
  2. » Three Way Handshake
  3. » TCP Communication Flags
  4. » Hping Commands
  5. » Scanning Techniques
  6. » Searching Vulnerable Systems
  7. » Operating System Fingerprinting
  8. » Complete Study on Banner Grabbing
  9. » Vulnerability Scanning
  10. » Proxy Servers
  11. » Use of Proxies
  12. » Working of Multi Proxies
  13. » Proxy Tools
In the module of network scanning, which is also called pre attack phase, students will able to gather information about the targeted network, to perform vulnerability analysis which will be used to penetrate into the network.
7th Module : System Hacking and Passwords Breaking
  1. » CCAS Hacking Methodology
  2. » Password Cracking
  3. » Password Complexity
  4. » Password Cracking Techniques
  5. » Types of Password Attacks
  6. » Microsoft Authentication
  7. » How Hash Passwords are Stored in Windows SAM?
  8. » PWdump7 and Fgdump
  9. » LazeSoft
    • Ophcrack
    • Cain & Abel
  10. » Detail Study on Password Cracking Tools
  11. » Keylogger
  12. » Types of Keystroke Loggers
  13. » Detail Study on Keyloggers and Spywares
  14. » AntiKeyloggers
  15. » Spyware
  16. » Types of Spyware
  17. » USB Spyware
  18. » Audio Spyware
  19. » Email or internet Spyware
  20. » Antispyware
In the module of system hacking,  the students how to penetrate into the network using exploits / coding or tools. Password breaking will help the students to learn how to break the password of various files , system etc
8th Module : Steganography & Cryptography
  1. » Steganography Techniques
  2. » How Steganography Works
  3. » Types of Steganography
  4. » Methods of Steganography
  5. » Steganography Detection Tools
  6. » Cryptography
  7. » Types of Cryptography
  8. » Cryptography Techniques
  9. » What is SSH
  10. » Cryptography Tools
  11. » Cryptography Attacks
  12. » Code Breaking Methodologies
 In this module learn about how to use cryptographic techniques to encrypt the communication channels
9th Module : Trojans and Backdoors
  1. » Reasons of Trojans
  2. » How to use Trojans
  3. » How Systems get infected by Trojans
  4. » Types of Trojans
  5. » Designing Trojans
  6. » Removing Trojans
  7. » Detail study on Designing and use Trojans
  8. » Detections Trojans
  9. » How to create Backdoors
  10. » Uninstalling Trojans remotely
  11. » Purpose of Backdoors
  12. » Study on Anti-Trojan Sofware
  13. » Backdoor Countermeasures
  14. » Trojans Countermeasures
In this module learn how to design / detect and remove the Trojans and wormseed
10th Module : Viruses & Worms
  1. » Introduction to Viruses
  2. » Stages of Viruses Life
  3. » Working Of Viruses
  4. » Why Do People Create Computer Viruses
  5. » Indications of Viruses attack
  6. » How does a Computer get infected by Viruses
  7. » Viruses Analysis
  8. » Types of Viruses
  9. » Desiging Viruses
  10. » Computer Worms
  11. » Worm Maker
  12. » Worm Analysis
  13. » Anti-Virus Tools
  14. » Virus detection methods
  15. » Virus & Worms Countermeasures
In this module learn about the design / detection and removal of virus and worms from the system
11th Module : Sniffers & Phishing
  1. » Sniffing Threats
  2. » How a Sniffer Works
  3. » What is Address Resolution Protocol (ARP)
  4. » Types of Sniffing
  5. » How DHCP works
  6. » Spoofing Attacks
  7. » DNS Poisoning
  8. » Sniffing Tool : WireShark
  9. » Sniffing Prevention Techniques
  10. » How to Detect Sniffing
  11. » What is Phishing
  12. » How Phishing works
  13. » Types Of Phishing
  14. » Designing Phishing
  15. » Detection of Phishing
In this module learn about the design / detection and removal of virus and worms from the system
12th Module : Social Engineering
  1. » What is Social Engineering
  2. » Behaviors Vulnerable to attacks
  3. » Why is Social Engineering Effective
  4. » Warning Signs of an Attacks
  5. » Phases in a Social Engineering attack
  6. » Impact on the Organization
  7. » Command Injection Attacks
  8. » Common Targets of Social Engineering
  9. » Types of Social Engineering
  10. » Social Engineering Through Impersonation On Social networking Sites
  11. » Risks of Social Networking to Corporate Networks
  12. » Social Engineering Countermeasures
In ethical hacking course this module learn how to collect information using social engineering.
13th Module : Denial of Service
  1. » What is Denial of Service Attack
  2. » What is Distributed Denial Of Service Attacks
  3. » Symptoms of DoS attack
  4. » Internet Relay Chat (IRC)
  5. » DoS Attack Techniques
  6. » Botnet
  7. » DoS/DDoS Countermeasures
  8. » Detail Study on DoS attack Tools
  9. » Detection Techniques
In this module learn how to spam the websites and techniques to secure from these attacks
14th Module : Session Hacking
  1. » What is Session Hijacking
  2. » Key Session Hijacking Techniques
  3. » Session Hijacking Process
  4. » Types of Session Hijacking
  5. » Session Hijacking Tools
  6. » Countermeasures
  7. » Methods to Prevent Session Hijacking
  8. » Defending Against Session Hijacking Attacks
In this module learn about session hijacking which will help them to hack the accounts using cookies or sessions.
15th Module : Hacking Web Applications
  1. » Web Application Security Statistics
  2. » Introduction to Web Applications
  3. » Web Application Components
  4. » How Web Applications Work?
  5. » Web Application Architecture
  6. » Injection Flaws
  7. » What is LDAP Injection?
  8. » How LDAP Injection Works?
  9. » Cross-Site Scripting (XSS) Attacks
    • » How XSS Attacks Work?
    • » Cross-Site Scripting Attack Scenario: Attack via Email
    • » XSS Example
    • » XSS Cheat Sheet
    • » Cross-Site Request Forgery (CSRF) Attack
    • » How CSRF Attacks Work?
  10. » Web Application Denial-of-Service (DoS) Attack
  11. » Buffer Overflow Attacks
  12. » Cookie/Session Poisoning
    • » How Cookie Poisoning Works?
  13. » Hacking Web Servers
  14. » Username Enumeration
  15. » Password Attacks: Password Functionality Exploits
  16. » Password Attacks: Password Guessing
  17. » Password Attacks: Brute-forcing
  18. » Session Attacks: Session ID Prediction/ Brute-forcing
  19. » Cookie Exploitation: Cookie Poisoning
  20. » Encoding Schemes
    • » How to Defend Against SQL Injection Attacks?
    • » How to Defend Against Command Injection Flaws?
    • » How to Defend Against XSS Attacks?
    • » How to Defend Against DoS Attack?
    • » How to Defend Against Web Services Attack?
  21. » Web Application Countermeasures
In this module learn how to secure and hack the websites.
16th Module : SQL Injection
  1. » What is SQL Injection?
  2. » SQL Injection Attacks
  3. » How Web Applications Work?
  4. » SQL Injection Detection
  5. » Types of SQL Injection
  6. » What is Blind SQL Injection?
  7. » SQL Injection Methodology
  8. » Information Gathering
    • » Password Grabbing
    • » Grabbing SQL Server Hashes
    • » Extracting SQL Hashes (In a Single Statement)
  9. » SQL Injection Tools
  10. » How to Defend Against SQL Injection Attacks?
    • » How to Defend Against SQL Injection Attacks: Use Type-Safe SQL Parameters
In this module learn about hacking and security of the database.
17th Module : Miscellaneous
  1. » Wifi Hacking – WPA2
  2. » Creating fake access point
  3. » Android Phone hacking
  4. » Deleted Data recovery
  5. » Detail study on android phone pattern breaking
  6. » Android Phone Rooting
  7. » MITM
  8. » Whatsapp Data Recovery
In this module learn about the wifi hacking, Whatsapp hacking, data recovery and android phone hacking
18th Module : Cyber Crime Investigation
  1. » Introduction to Cyber Crime Investigation.
  2. » Types of Cyber Crimes.
  3. » Report Cyber Crimes.
  4. » Investigating Emails (Email Tracing)
  5. » Online email header analysis.
  6. » Investigating Phishing Cases.
  7. » Investigating Data Theft Cases.
  8. » Investigating Orkut Profile Impersonation Cases.
  9. » Cyber Law & IT Act, 2000 / 2008.
In this module learnabout the cyber crime investigation with some live case studies.

0 Comments