Professional Documents
Culture Documents
CSP Certified Ethical Hacker: Highlights
CSP Certified Ethical Hacker: Highlights
CSP Certified Ethical Hacker: Highlights
HIGHLIGHTS
01 | Introduction
02 | Identity Changing
03 | Basic Hacking Using CMD
04 | Social Media Hacking And Security
05 | Windows Hacking And Security
06 | Windows System Monitoring
07 | Android Phone Hacking And Security
08 | Virus Creation And Prevention
09 | Web Attacks And Prevention
10 | Data Security
11 | Online Banking Transaction
12| WIFI Hacking And Security
13 | Deep Web : The Hidden Internet
14 | Cyber Crime And Cyber Law
15 | Test
MODULE 01 | INTRODUCTION
| What is Hacking ?
| What is Ethical Hacking ?
| Types of Hackers
| What is Operating System ?
| What is Software ?
System Software | Application Software | Utility Software
| What is Hardware ?
| Input Devices : Keyboard, Mouse, Scanner
| Processing Devices : CPU and GPU
| Output Devices : Monitor,Speaker, Printer
| Storage Devices : RAM, ROM, HDD, SSD, USB Drive, External HDD
| What is Network ?
| What is HUB, SWITCH and ROUTER ?
| What is Server ?
| What is Client ?
| What is ISP ?
| IP Address : Local IP Address and Public IP Address
| What is Submarine Cable ?
| How Real Internet Works ?
| What is Keylogger ?
* Using Revealer Keylogger
* Using Flash Keylogger
* Using Saved Logins
* Using OTP Stealing with Android Messages
* Using Phishing
| Security ?
Never login from unknown devices
Never give your device to anyone
Set 2FA
Never login from any
link
Never REMEMBER PASSWORD in Browsers
| Security ?
Set BIOS Password
Set BITLOCKER on System Drive
| Security ?
Don’t give your phone to anybody for even 2 minutes.
Turn on Play Protect always.
Don’t install apps from Unknown Sources about Hacking.
| Security ?
Turn On Windows Defender or Use Anti Virus Program
Never open any unknown file
Test any unknown file on VIRUSTOTAL.COM before executing
MODULE 09 | WEB ATTACKS AND PREVENTION
| What is Website ?
| What is Domain ?
| What is Hosting ?
| What is Webserver ?
How it Works ?
* DOS Attack
* DDOS Attack
| Security ?
Using DDOS Protection Service
MODULE 15 | TEST