Cyber Security & Ethical Hacking
Need of cyber security
Ethical hacking
Types of hackers
Penetration Testing
Footprinting
Footprinting techniques
Cryptography
    Types of Cryptography
    Symmetric / Asymmetric
    Digital Signatures
    Hash functions
Computer Networks & Security
    Computer Network Architecture; Layered Architecture
    OSI Model
    TCP / IP Model
    Common Network Threats
Application & Web Security
    Web server architecture & attacks
    Web client architecture & attacks
    Counter measures & patch management
Identity & Access Management (IdAM)
    Authentication
    Authorization
    IdAM
    Password protection
    Identity threats
Vulnerability Analysis (VA) & System Hacking
    VA Types
VA Lifecycle
VA Tools
Vulnerability scoring system
VA Report
System Hacking
Password cracking
Privilege escalation, hiding files, clearing logs
Sniffing & SQL Injection
    Malware & its types
    Sniffing attacks & its types
    SQL injection & its types
Denial of Service (DoS) & Session Hijacking
    DoS attacks & symptoms
    DoS detection
    System Hijacking
    Session / Application level hijacking
Intrusion Detection Systems (IDS) & types
Firewalls & Types
Honeypots
Evading IDS
Sources of Reference :
I hope you find it useful, and wish you best for your coding journey. Just a last advice - "Never do anything for earning, do it for learning because greed never dies."
Keshav Raturi
 
 
              

 
    
Top comments (0)