The document discusses the key topics in ethical hacking and cyber security including the need for cyber security and different types of hackers. It covers cryptography, computer networks and security, application and web security, identity and access management, vulnerability analysis and system hacking, sniffing and SQL injection, denial of service attacks, and intrusion detection systems. The topics provide an overview of the essential concepts in ethical hacking, penetration testing, and techniques used to assess and enhance cyber security.
The document discusses the key topics in ethical hacking and cyber security including the need for cyber security and different types of hackers. It covers cryptography, computer networks and security, application and web security, identity and access management, vulnerability analysis and system hacking, sniffing and SQL injection, denial of service attacks, and intrusion detection systems. The topics provide an overview of the essential concepts in ethical hacking, penetration testing, and techniques used to assess and enhance cyber security.
The document discusses the key topics in ethical hacking and cyber security including the need for cyber security and different types of hackers. It covers cryptography, computer networks and security, application and web security, identity and access management, vulnerability analysis and system hacking, sniffing and SQL injection, denial of service attacks, and intrusion detection systems. The topics provide an overview of the essential concepts in ethical hacking, penetration testing, and techniques used to assess and enhance cyber security.
Cyber Security & Ethical Hacking Need of cyber security Ethical hacking Types of hackers Penetration Testing Footprinting Footprinting techniques Cryptography Types of Cryptography Symmetric / Asymmetric Digital Signatures Hash functions
Computer Networks & Security
Computer Network Architecture; Layered Architecture OSI Model TCP / IP Model Common Network Threats
Application & Web Security
Web server architecture & attacks Web client architecture & attacks Counter measures & patch management Identity & Access Management (IdAM) Authentication Authorization IdAM Password protection Identity threats
Vulnerability Analysis (VA) & System Hacking
VA Types VA Lifecycle Winnovative PDF Tools Demo VA Tools Vulnerability scoring system VA Report System Hacking Password cracking Privilege escalation, hiding files, clearing logs
Sniffing & SQL Injection
Malware & its types Sniffing attacks & its types SQL injection & its types Denial of Service (DoS) & Session Hijacking DoS attacks & symptoms DoS detection System Hijacking Session / Application level hijacking Intrusion Detection Systems (IDS) & types Firewalls & Types Honeypots Evading IDS