CYBER SECURITY

COMMON TERMINOLOGY

  • What is cyber security
  • Hacking
  • White hat hackers
  • Black hat hackers
  • Grey hat hackers
  • Vulnerability assessment
  • Exploit
  • payloads

Phases of Penetration testing

  • Footprinting
  • Scanning
  • Gaining access
  • Maintain access
  • Clearing tracks

Basic concepts of networking

  • Networking devices
  • TCP IP
  • Subnetting
  • Understanding  service
  • DNS server
  • DHCP server
  • Nat server
  • Web server

CRYPTOGRAPHY

  • Key terminologies
  • Technologies used in cryptography
  • Symmetric encryption scheme
  • Asymmetric encryption scheme
  • Public key cryptography
  • Hashing technologies
  • Brute force attacks
  • dictionary attacks
  • Rule based Attacks
  • Rainbow table attacks
  • Steganography

FOOTPRINTING

  • Targets of footprinting
  • IT infrastructure
  • Organizational infrastructure
  • Foot printing using Google
  • Foot printing using Whois
  • Foot printing  using  DNS queries
  • Foot printing  using command line utilities
  • Ping
  • Tracert

NETWORK SCANNING

  • Scanning open ports
  • Defense against port scanner
  • Scanning tools

SPOOFING

  • IP address spoofing
  • MAC address spoofing
  • SMS spoofing
  • URL spoofing
  • Email spoofing
  • Arp spoofing

Windows Firewall

  • Firewall In Windows
  • Configuring Windows Firewall
  • Windows Firewall Advanced Security
  • Inbound & Outbound Rules?

WEB APPLICATION VULNERABILITY

  • Cross site scripting
  • Cross site request forgery attack
  • Brute force attack
  • No rate limit
  • Session and cookies
  • File inclusion
  • Directory traversal attack
  • Host header attack

SQL INJECTION

  • Error based
  • Union based
  • Blind based

SYSTEM SECURITY

  • Introduction to OS
  • Windows
  • Linux
  • User centered attacks

MALWARES

  • Virus
  • Worm
  • Trojan
  • Rootkit
  • Bots
  • Adware
  • Key loggers

SOCIAL  ENGINEERING

  • Phishing
  • Shareware
  • Tailgating
  • Pop ups
  • Shoulder surfing
  • Dumpster diving

Denial of service attack

  • DOS Attack
  • DDOS