Ethical Hacking: Presented By: CYBER SHIELD
Ethical Hacking: Presented By: CYBER SHIELD
Ethical Hacking: Presented By: CYBER SHIELD
Part 1 : Preliminaries
1. Introduction
2. Ethical Hacking
3. Who Are The Hackers
4. Why do Hackers Hack
5. Types of Hackers
6. What should do after hack
7. Why do We Need Ethical Hacking
8. Required Skills For An Ethical Hacker
9. What do hackers do after Hacking?
10. Most Frequently Asked Questions
Part 2 :
● Show off.
01 03
Foot Printing Gaining Access
02 04
Scanning Maintaining Access
Foot Printing
● Whois lookup
● NS lookup
● IP lookup
Scanning
● Port Scanning
● Network Scanning
● Finger Printing
● Fire Walking
Gaining Access
● Password Attacks
● Social Engineering
● Viruses
Required Skills of an Ethical Hacker
Here’s what you need to becime an ethical hacker:
2. Bash Scripting
3. Python Basics
● - Python request
8. Enumeration
● - Port Scanning
● - IP Scanning
● - Shodan
● - ASN Scanning
● - IP Info and Iraq ASN Summary
● - All Device Scanning (Routers, Cameras, Microtek Systems, Network)
9. Scanning Vulnerability
● - Website Scanning
● - Subdomain Scanning
15. XSS
● - XSS Reflector
● - XSS dom Based
● - XSS Stored
Introduction to Cyber Security