Topics under Ethical Hacking & Cyber Security

Cyber Security & Ethical Hacking

Need of cyber security

Ethical hacking

Types of hackers

Penetration Testing

Footprinting

Footprinting techniques

Cryptography

        Types of Cryptography

        Symmetric / Asymmetric

        Digital Signatures

        Hash functions

Computer Networks & Security

        Computer Network Architecture; Layered Architecture

        OSI Model

        TCP / IP Model

        Common Network Threats

Application & Web Security

        Web server architecture & attacks

        Web client architecture & attacks

        Counter measures & patch management

Identity & Access Management (IdAM)

        Authentication

        Authorization

        IdAM

        Password protection

        Identity threats

Vulnerability Analysis (VA) & System Hacking

        VA Types

VA Lifecycle

VA Tools

Vulnerability scoring system

VA Report

System Hacking

Password cracking

Privilege escalation, hiding files, clearing logs

Sniffing & SQL Injection

        Malware & its types

        Sniffing attacks & its types

        SQL injection & its types

Denial of Service (DoS) & Session Hijacking

        DoS attacks & symptoms

        DoS detection

        System Hijacking

        Session / Application level hijacking

Intrusion Detection Systems (IDS) & types

Firewalls & Types

Honeypots

Evading IDS