KEMBAR78
Ethical Hacking For Beginners Syllabus | PDF
0% found this document useful (0 votes)
146 views2 pages

Ethical Hacking For Beginners Syllabus

The document outlines a course titled 'Ethical Hacking for Beginners' consisting of 12 modules covering various topics such as the fundamentals of ethical hacking, networking basics, and system hacking techniques. It includes practical tools and methodologies for network scanning, malware analysis, web application security, and cryptography. Additionally, the course features hands-on practice through Capture the Flag challenges and penetration testing simulations.

Uploaded by

tepsopha168
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
146 views2 pages

Ethical Hacking For Beginners Syllabus

The document outlines a course titled 'Ethical Hacking for Beginners' consisting of 12 modules covering various topics such as the fundamentals of ethical hacking, networking basics, and system hacking techniques. It includes practical tools and methodologies for network scanning, malware analysis, web application security, and cryptography. Additionally, the course features hands-on practice through Capture the Flag challenges and penetration testing simulations.

Uploaded by

tepsopha168
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Course Title: Ethical Hacking for Beginners

Module 1: Introduction to Ethical Hacking


• - What is Ethical Hacking?
• - Types of Hackers (White Hat, Black Hat, Grey Hat)
• - Legality and Ethics in Cybersecurity
• - Introduction to Cyber Laws

Module 2: Networking Basics


• - Basics of Networking (IP, DNS, DHCP, NAT)
• - Understanding TCP/IP and OSI Models
• - Common Ports and Protocols
• - Network Devices and Topologies

Module 3: Footprinting and Reconnaissance


• - Types of Footprinting (Passive and Active)
• - Tools and Techniques (WHOIS, NSLookup, Maltego)
• - Social Engineering Basics

Module 4: Scanning Networks


• - Understanding Network Scanning
• - Using Nmap and Advanced Nmap Techniques
• - Banner Grabbing and OS Fingerprinting

Module 5: Enumeration
• - NetBIOS Enumeration
• - SNMP Enumeration
• - LDAP and SMTP Enumeration

Module 6: System Hacking


• - Password Cracking Techniques
• - Privilege Escalation
• - Covering Tracks

Module 7: Malware and Viruses


• - Types of Malware (Virus, Worm, Trojan)
• - Introduction to Ransomware
• - Antivirus Evasion Techniques

Module 8: Sniffing and Session Hijacking


• - What is Sniffing?
• - Wireshark Basics
• - Session Hijacking Techniques

Module 9: Web Application Security


• - Common Web Vulnerabilities (XSS, SQLi, CSRF)
• - OWASP Top 10 Overview
• - Burp Suite Introduction

Module 10: Wireless Network Hacking


• - Types of Wireless Encryption (WEP, WPA, WPA2)
• - Aircrack-ng Suite
• - Evil Twin Attacks

Module 11: Cryptography Basics


• - Symmetric vs Asymmetric Encryption
• - Hashing Algorithms (MD5, SHA1, SHA256)
• - Public Key Infrastructure (PKI)

Module 12: Capture the Flag (CTF) Practice


• - Intro to CTF Challenges
• - Basic Labs and Practice Environments (TryHackMe, Hack The Box)
• - Project: Penetration Testing Simulation

You might also like