Professional Documents
Culture Documents
Mooc Based Seminar Report 3 Sem Tanisha Pant
Mooc Based Seminar Report 3 Sem Tanisha Pant
On
Tanisha Pant
Under the Guidance of
Dr. Bhupesh Rawat
(Assistant Professor)
SCHOOOL OF COMPUTING
GRAPHIC ERA HILL UNIVERSITY BHIMTAL
SESSION (2023-2024)
CERTIFICATE
2023-2024.
SIGNATURE SIGNATURE
ACKNOWLEDGEMENT
I take this opportunity to express my profound gratitude and deep
throughout the project. The Success and final outcome of this course
report. All that I have Done is only due to such supervision and
Tanisha Pant
2271322
ETHICAL HACKING AND PENETRATION
TESTING
WEEK I
TERMINOLOGY
WEEK II
LINUX ESSENTIAL
WEEK III
FUNDAMENTALS
WEEK IV
WEEK V
PENETRATION TESTING
WEEK I
CHAPTER.1
➢ TERMINOLOGY
i. Viruses –
A computer virus is a type of malware that attaches itself to
legitimate programs or files, infecting them and spreading to
other programs or files when they are executed.
ii. Worms –
Worms are self-replicating malware that can spread across
computer networks without user interaction.
i Network Fundamentals –
ii Cryptography Fundamentals -
Networking:
iv Python Fundamentals:
Web Scraping:
Learn the basics of web scraping using libraries like requests and
BeautifulSoup.
Understand how to extract information from websites
programmatically.
Cybersecurity Concepts:
Phishing:
Phishing involves sending fraudulent emails, messages, or
websites that appear to be from a trustworthy source. The goal is
to trick the recipient into revealing sensitive information, such
as usernames, passwords, or financial details.
Types of Phishing:
Social Engineering:
Social engineering is a broader concept that involves
manipulating individuals into performing actions or divulging
confidential information. It relies on psychological manipulation
rather than technical exploits.
Common Techniques:
Authorization:
Scope Definition:
Reconnaissance:
Exploitation:
Post-Exploitation:
Remediation:
After receiving the penetration test report, the organization can use
the recommendations to address and fix the identified
vulnerabilities. This step is crucial for improving the overall
security posture.
Continuous Testing: