Page Nav

HIDE

Left Sidebar

TO-LEFT

Pages

Breaking News

latest

🔰Bitten Tech - Pre Hacker Hacking Course🔰

               🔰Bitten Tech - Pre Hacker Hacking Course🔰 TechHacker Ethical Hacking and Cyber Security Mega Bundle Part-1 Pre-Hacking Cou...

               🔰Bitten Tech - Pre Hacker Hacking Course🔰


TechHacker Ethical Hacking and Cyber Security Mega Bundle Part-1

Pre-Hacking Course


Module 1: Introduction


1. Introduction to Information Security


2. Information Security Threats


3. Introduction to Cyber Security


4. The CIA Triad


5. Introduction to Hacking and Hackers


6. Types of Hackers


7. Introduction to Ethical Hacking


8. Information Warfare


9. Need for Ethical Hackers


10. Careers in Ethical Hacking


11. Course Overview


12. General Terminologies 


13. How to become an Ethical Hacker


Module 2: Basics and Environment Setup


1. Cyber Security Basics


1. Advantages and Limitations of Cyber Security

2. Cyber Defense

3. Skills of an Ethical Hacker

4. Information Security Policies

5. Vulnerability Research


2. Operating Systems: Linux


1. Introduction and Evolution of Linux

2. Major Distributions of Linux

3. Advantages of Linux

4. Linux for Penetration Testing


3. Types of Hackers contd.


1. Crackers

2. White hat, black hat, grey hat

3. Hacktivist

4. Script kiddie

5. Neophyte


4. Phases of Hacking


1. Footprinting

2. Scanning

3. Gaining Access

4. Maintaining Access

5. Clearing logs


5. Penetration Testing


6. Phases of Penetration Testing


1. Pre engagement Actions

2. Reconnaissance

3. Threat Modeling & Vulnerability Identification

4. Exploitation

5. Post-Exploitation

6. Reporting

7. Resolution & Re-Testing


7. Cyber Security vs. Ethical Hacking


8. Ethical Hacking Laws and Policies


9. IT Act 2000


10. Risk Management and Methodology


11. Software/Hardware Requirements for Hacking Lab


12. Installation and Configuration of VMWare


13. Dual Boot vs Virtual Machine


13. Installing Kali in Virtual Machine


1. Selecting an appropriate distro

2. Downloading the machine

3. Downloading VMWare

4. Installing on Windows 10 host

5. Configuring Kali 2019.4 in VMWare

6. Installation


15. Managing Network Interfaces


1. NAT vs. Bridged vs. Host only


16. Download and installation of DVWA and BWAPP


17. Installing Metasploitable


18. Installing OWASP Broken Web Application


Module 3: Linux Refresher


1. Introduction to Command Line 


1. Command Shell basics

2. Windows Command Line

3. Linux Command Line


2. File Systems


1. Unix File System

2. NTFS vs. FAT vs. EXT


3. User Hierarchy


1. Linux User administration


4. Terminal and shell commands


1. Major DOS commands

2. Major Linux Terminal commands

3. Working with Linux User Administation

4. Working with Linux File permissions

5. Working with Linux Files and Directories

6. Working with Linux groups

7. Linux Package Manager: apt

8. Linux Useful Files


Module 4: Networking Refresher


1. The OSI/TCP-IP Model


1. Introduction to Layered Network Architecture

2. Significance of each Layer

3. Protocol Data Unit (PDU)

4. Working of each Layer


2. Data Link Layer


1. Working of DLL 

2. Introduction to MAC addresses

3. MAC address structure


3. Network Layer


1. Working of NL

2. Basics of IP addresses

3. Types of IP addresses

4. Classful and classless addressing


4. Transport Layer


1. Working of TL

2. Working of TCP and UDP

3. Differences and Similarilities of TCP and UDP

4. Basics of Port addressing

5. Types of Ports


5. Proxy and Proxy Servers


1. Introduction to Proxies

2. How proxies work

3. Applications of proxies

4. Types of Proxies

5. Types of Proxy Servers


6. TOR 


1. Introduction to Onion Routing

2. The TOR Network

3. Advantages and Disadvantages of TOR


7. VPN


1. Introduction to Virtual Networks

2. Introduction to Tunneling

3. Encapsulation and Encryption

4. Working of VPN

5. Protocols Implementing VPNs

6. Advantages and Disadvantages of VPN

7. Types of VPN


8. Remote login: SSH and telnet


1. Working of Remote Login

2. Introduction to telnet

3. Introduction to Secure Shell (SSH)


9. Introduction to NAT and Port Forwarding


Module 7: Enumeration


1. Basics and overview


2. Techniques of enumeration


3. NetBIOS Enumeration


1. NetBIOS Enumeration Tool: nbtstat

2. Enumerating NetBios Name Tables

3. Enumerating User Accounts


4. SNMP Enum


1. Working of SNMP

2. SNMP Architecture


5. LDAP Enum

1. Introduction to LDAP

2. LDAP Directory Struture


6. SMTP Enum


1. SMTP Enumeration Tool: telnet

2. MetaSploit SMTP enum exploits


7. DNS Enum


1. Introduction to DNS Zones

2. Introduction to DNS Zone Transfer

3. DNS Zone Transfer Enumeration Using NSLookup

4. DNS Zone Transfer Enumeration Using host command

5. The dig command

6. DNS Zone Transfer Enumeration Using dig command


8. SMB Enum


1. Working of SMB

2. nmap smb scripts

3. smbclient


9. NTP Enum

1. Introduction to NTP

2. NTP Servers Architecture


10. Enumeration Countermeasures



Size: 3.94 GB


Link :- https://mega.nz/folder/W8QSAYbL#7Yc5LVlNtk-YYWdUBwSZ1A



No comments