Outline of Ethical Hacking: Hacking and Penetration Testing Training Chapter 1. Introduction and concepts
- Ports to know
- StandardsDuration
- NIST 800-115
- NIST 800-53
- NSA-IAM
- PCI-DSS
- Terminology
- Vulnerability Scanning
- Passive Scanning
- Shodan.io
Chapter 2. Scanning and enumerating
- TCPDump
- SuperScan
- NMAP
- Cain and Abel
- Basic Networking
- DNS Zone transfer
- Wireshark
- Security Fundamentals
Chapter 3. Intro to Kali Linux
- Basic Linux
- How to use Metasploit
- Metasploit applications
Chapter 4. Intro to Metasploit
- Overview of Metasploit
- Scanning with Metasploit
- Basic exploits
- Post exploits
Chapter 5. Cryptography and general knowledge
- General overview of crypto
- Steganography
- Hashes and Rainbow Tables
- Wi-Fi
- Bluetooth
- TOR/Dark Web
Chapter 6. Malware
- Malware types
- Malware taxonomy
- Creating basic malware with tools
- Creating basic malware by hand.
Chapter 7. Windows hacking
- Windows essentials
- Registry
- Windows structure
- Password cracking
- SMB exploits
Chapter 8. Web Hacking
- Basic web structure
- SQL Injection
- XSS & CRSF
- Basic Burp Suite
The course also includes numerous hands on labs. Students will use nmap, shodan.io, burp suite, Metasploit, and other tools. Students will create a basic virus and a basic Trojan horse. Students will manually perform SQL Injection.