Cyber Security & Ethical Hacking
Need of cyber security
Ethical hacking
Types of hackers
Penetration Testing
Footprinting
Footprinting techniques
Cryptography
Types of Cryptography
Symmetric / Asymmetric
Digital Signatures
Hash functions
Computer Networks & Security
Computer Network Architecture; Layered Architecture
OSI Model
TCP / IP Model
Common Network Threats
Application & Web Security
Web server architecture & attacks
Web client architecture & attacks
Counter measures & patch management
Identity & Access Management (IdAM)
Authentication
Authorization
IdAM
Password protection
Identity threats
Vulnerability Analysis (VA) & System Hacking
VA Types
VA Lifecycle
VA Tools
Vulnerability scoring system
VA Report
System Hacking
Password cracking
Privilege escalation, hiding files, clearing logs
Sniffing & SQL Injection
Malware & its types
Sniffing attacks & its types
SQL injection & its types
Denial of Service (DoS) & Session Hijacking
DoS attacks & symptoms
DoS detection
System Hijacking
Session / Application level hijacking
Intrusion Detection Systems (IDS) & types
Firewalls & Types
Honeypots
Evading IDS
Sources of Reference :
I hope you find it useful, and wish you best for your coding journey. Just a last advice - "Never do anything for earning, do it for learning because greed never dies."
Keshav Raturi
Top comments (0)