-
1.
Footprinting and Reconnaissance
Creating a profile of a target system or network's operations, infrastructure, and security posture is known as fingerprinting. The techniques covered in this module include active strategies (like network scanning) and passive methods (like searching online sources) for obtaining useful information for later stages of ethical hacking.
-
2.
Scanning Networks
The CompTIA Security+ SY0-601 certification training is covered in this course, with an emphasis on risk management, network security, and cryptography. Participants learn how to apply security measures and respond to threats through hands-on labs, equipping them with the skills necessary to properly protect digital assets.
-
3.
Enumeration
Identifies possible attack vectors by extracting data about users and systems, such as usernames, group memberships, network resources, and more.
-
4.
System Hacking
Methods for breaking into systems, such as using applications to get unauthorized access, escalating privileges, and cracking passwords.
-
5.
Malware Threats
Investigates various malware (viruses, worms, Trojan horses, etc.) and their behaviors, emphasizing mitigation, analysis, and detection techniques.
-
6.
Sniffing
Capturing and analyzing network traffic to intercept sensitive information, such as passwords or session tokens, transmitted over the network.
-
7.
Social Engineering
Exploits human psychology to manipulate individuals into divulging confidential information or performing actions that compromise security.
-
8.
Denial of Service
Techniques to disrupt or disable network services and resources, rendering them unavailable to legitimate users.
-
9.
Session Hijacking
Seizing control of an active session between users, enabling an attacker to impersonate a legitimate user and gain unauthorized access.
-
10.
Hacking Web Servers
Techniques to exploit vulnerabilities in web server software and configurations, including methods to secure servers against such attacks.
-
11.
Hacking Web Applications
Identifies and exploits vulnerabilities in web applications, such as cross-site scripting (XSS), SQL injection, and session management flaws.
-
12.
SQL Injection
Techniques for exploiting vulnerabilities in SQL databases, allowing attackers to execute arbitrary SQL commands to manipulate data or bypass authentication.
-
13.
Hacking Wireless Networks
Explores weaknesses in wireless network security protocols (WEP, WPA, WPA2) and methods for securing wireless environments.
-
14.
Evading IDS, Firewalls, and Honeypots
Techniques to bypass intrusion detection systems (IDS), firewalls, and honeypots to avoid detection while performing attacks.
-
15.
Buffer Overflow
Exploitation of programming errors that allow an attacker to overwrite memory locations, potentially executing malicious code and gaining unauthorized access.
-
16.
Cryptography
Covers cryptographic algorithms, protocols, and their vulnerabilities, with focus on encryption, decryption, and digital signatures.
-
17.
Penetration Testing
Methodologies and tools for conducting ethical hacking assessments to identify and address vulnerabilities within an organization's security posture.
-
18.
Mobile Platform Hacking
Security challenges specific to mobile devices and applications, including vulnerabilities, exploits, and best practices for mobile security.
-
19.
IoT Hacking
Explores vulnerabilities and attacks targeting Internet of Things (IoT) devices, addressing security concerns in connected environments and devices.