CSP Certified Ethical Hacker: Highlights

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

CSP Certified Ethical Hacker

30 Days | 30 Hours | Fees : Rs 10000

HIGHLIGHTS
01 | Introduction
02 | Identity Changing
03 | Basic Hacking Using CMD
04 | Social Media Hacking And Security
05 | Windows Hacking And Security
06 | Windows System Monitoring
07 | Android Phone Hacking And Security
08 | Virus Creation And Prevention
09 | Web Attacks And Prevention
10 | Data Security
11 | Online Banking Transaction
12| WIFI Hacking And Security
13 | Deep Web : The Hidden Internet
14 | Cyber Crime And Cyber Law
15 | Test 
MODULE 01 | INTRODUCTION

| What is Hacking ?
| What is Ethical Hacking ?
| Types of Hackers
| What is Operating System ?
| What is Software ?
System Software | Application Software | Utility Software
| What is Hardware ?
| Input Devices : Keyboard, Mouse, Scanner
| Processing Devices : CPU and GPU
| Output Devices : Monitor,Speaker, Printer
| Storage Devices : RAM, ROM, HDD, SSD, USB Drive, External HDD
| What is Network ?
| What is HUB, SWITCH and ROUTER ?
| What is Server ?
| What is Client ?
| What is ISP ?
| IP Address : Local IP Address and Public IP Address
| What is Submarine Cable ?
| How Real Internet Works ?

MODULE 02 | IDENTITY CHANGING


* Change IP Address : Proxy and VPN and BlackHat Way
* Change MAC Address
* Change OS and Browser

MODULE 03 | BASIC HACKING USING CMD


* Finding Website IP Address
* Finding Computer and Routers Local IP
* Finding Computer Name and Username
* Finding Users on the Target System
* Change Admin Password without Knowing Current Password
* Find Saved WIFI Passwords from Target System
MODULE 04 | SOCIAL MEDIA HACKING AND SECURITY
[ Facebook, Instagram, Email, WhatsApp ]

| What is Keylogger ?
* Using Revealer Keylogger
* Using Flash Keylogger
* Using Saved Logins
* Using OTP Stealing with Android Messages
* Using Phishing

| Security ?
 Never login from unknown devices
 Never give your device to anyone
 Set 2FA
 Never login from any
link
 Never REMEMBER PASSWORD in Browsers

MODULE 05 | WINDOWS HACKING AND SECURITY


| What is Password ?
| What is LM and NTLM ?
| What is Password Hashes ?
| What is SAM ?
* How to Bypass Windows Password ?
* How to Set Backdoor in Windows ?

| Security ?
 Set BIOS Password
 Set BITLOCKER on System Drive

MODULE 06 | WINDOWS SYSTEM MONITORING


| What is Employee Monitoring ?
| Why to Monitor Employee Activity ?
| Is it Legal to Monitor Your Employees Activities ?
* Setup Monitoring on A Company Computers with Classroom Spy
MODULE 07 | ANDROID PHONE HACKING AND SECURITY
| What is Android ?
| What is Spyware ?
| Why Android is Hackable ?
| Why iOS is not Hackable ?
* Lets Hack Your Own Phone ;)
> Spy on Targets SMS, Calls and Contact Numbers
> Spy on Targets Phone Camera
> Spy on Targets WhatsApp | Instagram | Facebook
> Spy on Targets Files on His or Her Phone
> Spy on Targets Live Mobile Screen

* SMS Bombing and Protection


* Anonymous Calling
* Finding Pictures of Contact Numbers in Our Contact list

| Security ?
 Don’t give your phone to anybody for even 2 minutes.
 Turn on Play Protect always.
 Don’t install apps from Unknown Sources about Hacking.

MODULE 08 | VIRUS CREATION AND PREVENTION


| What is Virus ?
| What is Trojan ?
| What is Ransomware ?

| Creating Our Own Virus


* System Crasher
* Data Hider
* Data Wiper
* WinLocker
* Creating EXE of VIRUS

| Security ?
 Turn On Windows Defender or Use Anti Virus Program
 Never open any unknown file
 Test any unknown file on VIRUSTOTAL.COM before executing
MODULE 09 | WEB ATTACKS AND PREVENTION
| What is Website ?
| What is Domain ?
| What is Hosting ?
| What is Webserver ?
How it Works ?
* DOS Attack
* DDOS Attack

| Security ?
 Using DDOS Protection Service

MODULE 10 | DATA SECURITY


* Disable USB Ports on Your Laptop or Desktop
* Lock Your Keyboard and Mouse
* Hide Files and Folders
* Hide Drives
* Protect Application using PassDoor
* Block Website
* Data Backup Policy
* Data Recovery : Phone – Laptop – USB Drive – External HDD
* Steganography : Data Hiding Technique
* Turn on Windows Firewall
* Turn on Windows Defender

MODULE 11 | ONLINE BANKING TRANSACTION


 Always use your own Laptop or Phone for online banking transactions
 Never use Open WIFI.
 Never give your phone to anyone, they can install SPYWARE on your PHONE
 Never give your laptop to anyone they can install computer spyware on your
laptop or Desktop
 Don’t share your Account details with strangers on mail
 Remember to receive a payment you don’t need to enter your UPI PIN, Only
the time of payment you need to do it.
MODULE 12| WIFI HACKING AND SECURITY
| Introduction to WIFI
| Wi-Fi Security : WEP, WPA and WPA2
| Why WIFI Is Not Hackable ?
* Finding Who is Connected to our WIFI on Android
* Finding Saved WIFI Passwords on Windows
* Find Routers IP and Access : Change WIFI Name and Password
* Making WIFI Jammer using NODE MCU ESP8266

MODULE 13 | DEEP WEB : THE HIDDEN INTERNET


| Introduction
| What is Deep Web ?
| What is Dark Web ?
| What is TOR ?
| History of TOR
| How TOR Works ?
| What is TOR Circuit ?
* Deep Web Search Engine : Ahmia
* What is RED ROOM ?
* Hitmen Service
* Drugs
* Weapons
| Bitcoin : Payment Method of TOR
| Precautions to Use While Surfing Deep Web

MODULE 14 | CYBER CRIME AND CYBER LAW


| What is Cyber Crime ?
| What is Cyber Law ?
| History of Cyber Law in India
| Some Important Cyber Law to Remember

MODULE 15 | TEST 

You might also like