Basic Topics
Introduction to Information Security
Introduction
Need of Information Security
Ethical Side of Hacking
Steganography
Latest Test Cases
Cyber Law & Indian IT Acts
Basics of Network & Web Technology
Introduction
IP Address
NAT
IP Subnets
DHCP Server
Ports
DNS
Proxy Servers
Virtual Private Networks
DNS Server
OSI Model
Web Architecture
Server Configuration
HTML Basics
PHP Basics
Information Gathering & Foot Printing
Digital Foot Print
Information Gathering
Who is Information?
Web Server Details
Reverse IP Mapping
People Search
Tools to perform Digital Foot Printing
Email Attacks & Security
Phishing Attacks Desktop Phishing, Spear phishing
IDN Homograph Attack
Social Engineering
Fake Emails
Identify Fake Emails
Key Loggers
Email Encryption
Security Counter Measures
Google Dorks Database
Use Google to craft attacks
Advanced operations of Google
Advanced operations of Google
Find vulnerabilities using Google
Security Countermeasures
Intrusion Detection & Protection System, WAF and Honeypots
Introduction to Firewalls
Network Firewalls
Web Application Firewalls
Weakness in Firewalls
Intrusion Detection Systems and Weaknesses
Intrusion Prevention Systems and Weaknesses
Honey Pots and Security Misconfiguration
Web Application VAPT
Introduction to Web Architecture
Web Security Generic Misconception
Introduction to DBMS MySQL, MS SQL, Oracle, DB2
Introduction to SQL
OWASP Top 1 Attacks
Heartbleed Attack Shell Shock / Bash Bug
HTTP Response Splitting Denial of Service Attacks
Vulnerability Analysis using Burp Suite
Arbitrary File Upload
Applications to Automate VAPT
System Hacking & Security
OS Login Bypass
Malware Illustration Virus, Worms and Trojans
Create Malware
Evade Antivirus and Firewalls
Scan System for Malicious Applications
Introduction to Kali Linux
Install and Setup
Introduction to Linux based testing OS
System Architecture
Network Configuration
Essentials Commands
Network Attacks & Security
Introduction to Network Attacks
Man in Middle Attack
Wireless Attacks & Security
Introduction to Wireless Technology
MAC Filtering
Packet Encryption
Packet Sniffing
Types of Authentication
Types of Attacks
Mobile Attacks & Security
Introduction to Mobile Platforms
Security Architecture of Mobile Platforms
Introduction to VOIP
VOIP calls from any number to any number Fake Calls
Android Exploitation Framework