Ethical Hacking and cyber security syllabus.
Ethical Hacking and cyber security syllabus.
Excellence Academy
Ethical Hacking Syllabus
This syllabus outlines the key modules and topics typically covered in an ethical
hacking course. It is designed to provide learners with practical skills,
theoretical knowledge, and an understanding of ethical and legal implications.
2. Basics of Networking
• OSI and TCP/IP models
• IP addressing and subnetting
• DNS, DHCP, and other essential protocols
• Network devices: Routers, switches, firewalls
• Wireless networks and vulnerabilities
4. Scanning Networks
• Network scanning basics
• Port scanning and service detection
• Vulnerability scanning tools: Nessus, OpenVAS
• Identifying live hosts and services
5. System Hacking
• Understanding operating system vulnerabilities
• Password cracking techniques
o Brute force, dictionary attacks, and rainbow tables
• Privilege escalation methods
• Maintaining access with backdoors and rootkits
• Clearing tracks and logs
9. Social Engineering
• Social engineering techniques: Phishing, pretexting, baiting
• Real-world case studies
• Countermeasures against social engineering attacks
Assessment
• Practical labs and hands-on exercises
• Quizzes and written exams
• Final project: Comprehensive penetration test of a simulated environment
1. Introduction to Cybersecurity
• Definition and importance of cybersecurity
• Goals of cybersecurity: Confidentiality, Integrity, Availability (CIA Triad)
• Cyber threats: Malware, phishing, ransomware, DoS/DDoS attacks
• Difference between cybersecurity and information security
• Careers in cybersecurity
2. Cybersecurity Terminology
• Key terms: Vulnerabilities, threats, risks, exploits, and patches
• Attack surface and attack vectors
• Security policies and standards (ISO 27001, NIST)
3. Basics of Networking
• Overview of networking concepts
• OSI and TCP/IP models
• Common protocols: HTTP, HTTPS, FTP, SMTP, DNS
• IP addressing, ports, and firewalls
• Basics of wireless networks and security
6. Basics of Cryptography
• What is cryptography and why is it important?
• Encryption and decryption basics
• Types of encryption: Symmetric and asymmetric
• Hashing and digital signatures
• Applications of cryptography in cybersecurity
Assessment
• Multiple-choice quizzes and short-answer tests
• Hands-on assignments or mini-projects
• Final assessment: Case study or practical demonstration of learned skills