Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
96 views

Roadmap AWS Course - 1

The document outlines a 7 week course on ethical hacking and cyber security. Week 1 covers introduction topics and password cracking methods. Week 2 focuses on open source intelligence and session hijacking. Week 3 looks at denial of service attacks. Weeks 4-5 cover SQL injection and WAF bypass techniques. Week 6 examines server scripts, backdoors, and IP exploits. Week 7 focuses on content management systems and Wordpress exploits.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views

Roadmap AWS Course - 1

The document outlines a 7 week course on ethical hacking and cyber security. Week 1 covers introduction topics and password cracking methods. Week 2 focuses on open source intelligence and session hijacking. Week 3 looks at denial of service attacks. Weeks 4-5 cover SQL injection and WAF bypass techniques. Week 6 examines server scripts, backdoors, and IP exploits. Week 7 focuses on content management systems and Wordpress exploits.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Course Module: Arena Web Security 1

Cyber Security and Ethical Hacking

Roadmap v-2.0

1st week • File Extension Viruses


• What is Ethical Hacking? • Pen Testing for Trojans and Backdoors
• Why we have to Learn Ethical Hacking? • Penetration Testing for Virus
• Ethical Hacking career • All Possible Passwords Cracking Method
• Homework • Password Guessing
• Login Page injection • Default Password
• SQLi • Session Hijacking
• Private exploit of Arena Web Security
2nd week • Compromising Session IDs using Sniffing
• Open Source Intelligence (Live practice)
 Live OSINT project • Compromising Session IDs by Predicting
• Tracking of a target person Session(Project)
• Recover any deleted files. [ PC or Mobile ] o HomeWork
• Cryptography
• Cypher Language
4th and 5th week:
• From Social Media
• SQL Inject
• Web server Whois
• PHP & MySQL Basic
• subdomain
• WAF Bypass (Live practice)
• Reserved IP Location
• POST base SQL Injection
• Which platform used for developing
• Error Base / X-path
• Ping to identify server details
o Home Work
• Collecting Information from Email Header
• Email Tracking Tools
• Evading IDS, Firewalls, and Honeypots 6th week -- 2 classes
• Malware Threats [Virus] • Server Shell script
o Home Work • Web Backdoors
• Shell upload
• Target IP Exploit (Live practice)
3rd week -- 2 classes
• Denial-of-Service
7th week -- 2 classes
• What is a Denial of Service Attack?
• Content Management System
• What Are Distributed Denial of Service Attacks?
• Website Development (Live Project)
• How Distributed Denial of Service Attacks Work
• Wordpress
• Live DDOS
 Wp Exploit (Live)
• What is a Trojan?
 CMS Vulnerability Assessment
• Batch programmer
Copyright © by Arena web security | all right reserved

You might also like