DEV Community

Cover image for Topics under Ethical Hacking & Cyber Security
Keshav
Keshav

Posted on

Topics under Ethical Hacking & Cyber Security

image

Cyber Security & Ethical Hacking

Need of cyber security

Ethical hacking

Types of hackers

Penetration Testing

Footprinting

Footprinting techniques

Cryptography

    Types of Cryptography

    Symmetric / Asymmetric

    Digital Signatures

    Hash functions
Enter fullscreen mode Exit fullscreen mode

Computer Networks & Security

    Computer Network Architecture; Layered Architecture

    OSI Model

    TCP / IP Model

    Common Network Threats
Enter fullscreen mode Exit fullscreen mode

Application & Web Security

    Web server architecture & attacks

    Web client architecture & attacks

    Counter measures & patch management
Enter fullscreen mode Exit fullscreen mode

Identity & Access Management (IdAM)

    Authentication

    Authorization

    IdAM

    Password protection

    Identity threats
Enter fullscreen mode Exit fullscreen mode

Vulnerability Analysis (VA) & System Hacking

    VA Types
Enter fullscreen mode Exit fullscreen mode

VA Lifecycle

VA Tools

Vulnerability scoring system

VA Report

System Hacking

Password cracking

Privilege escalation, hiding files, clearing logs

Sniffing & SQL Injection

    Malware & its types

    Sniffing attacks & its types

    SQL injection & its types
Enter fullscreen mode Exit fullscreen mode

Denial of Service (DoS) & Session Hijacking

    DoS attacks & symptoms

    DoS detection

    System Hijacking

    Session / Application level hijacking
Enter fullscreen mode Exit fullscreen mode

Intrusion Detection Systems (IDS) & types

Firewalls & Types

Honeypots

Evading IDS


Sources of Reference :

Video
Drive


I hope you find it useful, and wish you best for your coding journey. Just a last advice - "Never do anything for earning, do it for learning because greed never dies."
Keshav Raturi

Discussion (0)