INTRODUCTION TO HACKING AND SECURITY
  • Introduction
  • What is Information
  • What is Data
  • Why to Secure
  • What are Threats
  • Types of Hackers
  • What is a security breach
  • What is Risk and Risk Assessment
  • What is Hacking
  • Overall Course Map
  • Defending and countermeasures
Malwares
  • Introduction to Malware
  • Objective and Outcome
  • Virus - Introduction
  • Life Cycle of Virus
  • Worms - Introduction
  • Trojan - Introduction
  • Backdoor - Introduction
  • Anti Virus
Information Gathering
  • Objectives and Outcome
  • Introduction
  • Masking Identity
  • SSH Tunnelling
  • Social Profiling of Individual
  • Career Profiling
  • Email Address Harvesting
Network Hacking
  • Objective and Outcome
  • Network Basics
  • Network Hacking - Introduction
  • MAC spoofing
  • MAC spoofing - Exercise
  • Caffee Latte attack
  • WPA Hacking - Protocol
System Hacking
  • Objective and Outcome
  • Introduction
  • System Basics
  • Powering the system
  • Processor - Basics
  • Password Cracking
  • Steganography
  • Game Hacking
Web Hacking
  • Objective and Outcome
  • Web Basics
  • Phishing - Localhost and Server
  • Exercise clip - Phishing - Local Host
  • SQL Basics
Advanced Web-Hacking
  • Objective and Outcome
  • Phishing - Full Screen API
  • Exercise clip - Phishing - Full Screen API