0% found this document useful (0 votes)
2 views

CS-EH_SYLLABUS

The document outlines a comprehensive curriculum on Cyber Security and Ethical Hacking, covering various topics such as information security, hacking concepts, vulnerability assessment, malware threats, and web application security. It includes subtopics like footprinting, network scanning, social engineering, denial-of-service attacks, and cloud security, providing a structured approach to understanding and mitigating cyber threats. Additionally, it addresses countermeasures and tools relevant to each area of study.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

CS-EH_SYLLABUS

The document outlines a comprehensive curriculum on Cyber Security and Ethical Hacking, covering various topics such as information security, hacking concepts, vulnerability assessment, malware threats, and web application security. It includes subtopics like footprinting, network scanning, social engineering, denial-of-service attacks, and cloud security, providing a structured approach to understanding and mitigating cyber threats. Additionally, it addresses countermeasures and tools relevant to each area of study.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cyber Security and Ethical Hacking

Topic Sub Topics


Information Security Overview
Hacking Concepts
Introduction to Ethical Hacking
Ethical Hacking Concepts
Information Security Laws and Standards
Footprinting Concepts
Footprinting Through Search Engines
Footprinting Through Web Services
Website Footprinting
Email Footprinting
Footprinting and
Whois Footprinting
Reconnaissance DNS Footprinting
Network Footprinting
Footprinting Through Social Engineering
Footprinting Tools
Footprinting Countermeasures
Network Scanning Concepts
Scanning Tools
Scanning Networks Host Discovery
OS Discovery (Banner Grabbing/OS Fingerprinting)
Scanning Behind IDS or Firewall
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
Enumeration LADP Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures
Vulnerability Assessment Concepts
Vulnerability Classification and Assessment Types
Vulnerability Analysis
Vulnerability Assessment Solutions and Tools
Vulnerability Assessment Reports
System Hacking Concepts
Gaining Access
System Hacking Escalating Privileges
Maintaining Access
Clearing Logs
Malware Concepts
APT Concepts
Ransomware Concepts
Malware Threats
Virus, Trojan and Worm Concepts
Countermeasures
Anti Malware Software
Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Sniffing Tools
Countermeasures
Sniffing Detection Techniques
Social Engineering Concepts
Social Engineering Techniques
Insider Threats
Social Engineering
Impersonation on Social Networking Sites
Identity Theft
Countermeasures
DoS/DDoS Concepts
DoS/DDoS Attack Techniques
Botnets
Denial-of-Service
DDoS Case Study
Countermeasures
DoS/DDoS Protection Tools
Session Hijacking Concepts
Application Level Session Hijacking
Session Hijacking Network Level Session Hijacking
Session Hijacking Tools
Countermeasures
IDS, IPS, Firewall, Honeypots Concepts
IDS, IPS, Firewall, Honeypots Solutions
Evading IDS, Firewalls and Evading IPS and Firewalls
Honeypots IDS/Firewall Evading Tools
Detecting Honeypots
IDS/Firewall Evasion Countermeasures
Web Server Concepts
Web Server Attacks
Web Server Attack Methodology
Hacking Web Servers Web Server Attack Tools
Countermeasures
Patch Management
Web Security Tools
Web Application Concepts
Web Application Threats
Hacking Web Applications Web Application Hacking Methodology
Web API, and Web Shell
Web Application Security
SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection
SQL Injection Tools
Evasion Techniques
Countermeasures
Wireless Concepts
Wireless Encryption
Wireless Threats
Hacking Wireless Networks Wireless Hacking Methodology
Wireless Hacking Tools
Countermeasures
Wireless Security Tools
Mobile Platform Attack Vector
Hacking Android OS
Hacking Mobile Platforms
Hacking IOS
Mobile Security Guidelines and Tools
IoT Concepts
IoT Attacks
IoT Hacking IoT Hacking Methodology
IoT Tools
Countermeasures
Cloud Computing Concepts
Cloud T C yp o e m
Cloud Computing
Cloud Hacking
Cloud Security
Cryptography Concepts
Encryption Algorithms
Public Key Infrastructure (PKI)
Cryptography
Email Encryption
Disk Encryption
Countermeasures

You might also like