0% found this document useful (0 votes)
107 views4 pages

Beyaz Şapkalı Hacker Eğitimi

This document provides an overview of information security and ethical hacking. It discusses topics such as reconnaissance, scanning networks, enumeration, system hacking, malware threats, sniffing, social engineering, denial-of-service attacks, session hijacking, evading IDS and firewalls, hacking web servers and applications, SQL injection, wireless networking hacking, mobile platforms and IoT/OT hacking, cloud computing, and cryptography. For each topic, it lists relevant concepts, methodologies, tools, attacks, and countermeasures. The goal is to introduce fundamental methodologies used in ethical hacking to assess security vulnerabilities and strengthen an organization's security controls.

Uploaded by

Soner Çelik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views4 pages

Beyaz Şapkalı Hacker Eğitimi

This document provides an overview of information security and ethical hacking. It discusses topics such as reconnaissance, scanning networks, enumeration, system hacking, malware threats, sniffing, social engineering, denial-of-service attacks, session hijacking, evading IDS and firewalls, hacking web servers and applications, SQL injection, wireless networking hacking, mobile platforms and IoT/OT hacking, cloud computing, and cryptography. For each topic, it lists relevant concepts, methodologies, tools, attacks, and countermeasures. The goal is to introduce fundamental methodologies used in ethical hacking to assess security vulnerabilities and strengthen an organization's security controls.

Uploaded by

Soner Çelik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Topic Details

Information Security and Ethical Hacking Overview


- Information Security Overview
- Cyber Kill Chain Concepts
Introduction to Ethical - Hacking Concepts
Hacking - Ethical Hacking Concepts
- Information Security Controls
- Information Security Laws and Standards

Reconnaissance Techniques
- Footprinting Concepts
- Footprinting Methodology
- Footprinting through Search Engines
- Footprinting through Web Services
- Footprinting through Social Networking Sites
- Website Footprinting
Footprinting and
- Email Footprinting
Reconnaissance
- Whois Footprinting
- DNS Footprinting
- Network Footprinting
- Footprinting through Social Engineering
- Footprinting Tools
- Footprinting Countermeasures
- Network Scanning Concepts
- Scanning Tools
- Host Discovery
Scanning Networks - Port and Service Discovery
- OS Discovery (Banner Grabbing/OS Fingerprinting)
- Scanning Beyond IDS and Firewall
- Draw Network Diagrams
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
Enumeration - NTP and NFS Enumeration
- SMTP and DNS Enumeration
- Other Enumeration Techniques (IPsec, VoIP, RPC, Unix/Linux,
Telnet, FTP, TFTP, SMB, IPv6, and BGP enumeration)
- Enumeration Countermeasures

System Hacking Phases and Attack Techniques


- Vulnerability Assessment Concepts
- Vulnerability Classification and Assessment Types
Vulnerability Analysis
- Vulnerability Assessment Solutions and Tools
- Vulnerability Assessment Reports
System Hacking - System Hacking Concepts
- Gaining Access
- Cracking Passwords
- Vulnerability Exploitation
- Escalating Privileges
- Maintaining Access
- Executing Applications
- Hiding Files
- Clearing Logs
- Malware Concepts
- APT Concepts
- Trojan Concepts
- Virus and Worm Concepts
Malware Threats
- File-less Malware Concepts
- Malware Analysis
- Malware Countermeasures
- Anti-Malware Software

Network and Perimeter Hacking


- Sniffing Concepts
- Sniffing Technique: MAC Attacks
- Sniffing Technique: DHCP Attacks
- Sniffing Technique: ARP Poisoning
Sniffing - Sniffing Technique: Spoofing Attacks
- Sniffing Technique: DNS Poisoning
- Sniffing Tools
- Sniffing Countermeasures
- Sniffing Detection Techniques
- Social Engineering Concepts
- Social Engineering Techniques
- Insider Threats
Social Engineering - Impersonation on Social
- Networking Sites
- Identity Theft
- Social Engineering Countermeasures
- DoS/DDoS Concepts
- DoS/DDoS Attack Techniques
- Botnets
- DDoS
Denial-of-Service
- Case Study
- DoS/DDoS Attack Tools
- DoS/DDoS Countermeasures
- DoS/DDoS Protection Tools
- Session Hijacking Concepts
- Application Level Session Hijacking
Session Hijacking  - Network Level Session Hijacking
- Session Hijacking Tools
- Session Hijacking Countermeasures
- IDS, IPS, Firewall, and Honeypot Concepts
- IDS, IPS, Firewall, and Honeypot Solutions
- Evading IDS
Evading IDS, Firewalls, and
- Evading Firewalls
Honeypots
- IDS/Firewall Evading Tools
- Detecting Honeypots
- IDS/Firewall Evasion Countermeasures

Web Application Hacking


Hacking Web Servers - Web Server Concepts
- Web Server Attacks
- Web Server Attack Methodology
- Web Server Attack Tools
- Web Server Countermeasures
- Patch Management
- Web Server Security Tools
- Web App Concepts
- Web App Threats
- Web App Hacking Methodology
- Footprint Web Infrastructure
- Analyze Web Applications
- Bypass Client-Side Controls
- Attack Authentication Mechanism
- Attack Authorization Schemes
- Attack Access Controls
Hacking Web Applications
- Attack Session Management Mechanism
- Perform Injection Attacks
- Attack Application Logic Flaws
- Attack Shared Environments
- Attack Database Connectivity
- Attack Web App Client
- Attack Web Services
- Web API, Webhooks and Web Shell
- Web App Security
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
SQL Injection
- SQL Injection Tools
- Evasion Techniques
- SQL Injection Countermeasures

Wireless Network Hacking


- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
Hacking Wireless Networks
- Wireless Hacking Tools
- Bluetooth Hacking
- Wireless Countermeasures
- Wireless Security Tools

Mobile Platform, IoT, and OT Hacking


- Mobile Platform Attack Vectors
- Hacking Android OS
Hacking Mobile Platforms - Hacking iOS
- Mobile Device Management
- Mobile Security Guidelines and Tools
IoT and OT Hacking - IoT Concepts
- IoT Attacks
- IoT Hacking Methodology
- IoT Hacking Tools
- IoT Countermeasures
- OT Concepts
- OT Attacks
- OT Hacking Methodology
- OT Hacking Tools
- OT Countermeasures

Cloud Computing
- Cloud Computing Concepts
- Container Technology
- Serverless Computing
Cloud Computing
- Cloud Computing Threats
- Cloud Hacking
- Cloud Security

Cryptography
- Cryptography Concepts
- Encryption Algorithms
- Cryptography Tools
- Public Key Infrastructure (PKI)
Cryptography
- Email Encryption
- Disk Encryption
- Cryptanalysis
- Countermeasures

You might also like