Ethical Hacking Syllabus
Module 1: 2 Hours – 4 Topics
- Introduction to Ethical Hacking (Day 1)
- White Hat Hacker | Black Hat Hacker | Gray Hat Hacker (Day 1)
- Legality and Ethics (Day 1)
- Core Model of Information Security (CIA) (Day 1)
Module 2: 2 Hours – 2 Topics
- Basics of Networking (Day 2)
- Google Hacking (Day 2)
Module 3: 2 Hours – 2 Topics
- Kali Linux Introduction (Day 3)
- Setup Your Virtual Lab for Hacking (Day 3)
Module 4: 2 Hours – 1 Topic
- Scanning Network with NMAP (Day 4)
Module 5: 2 Hours – 1 Topic
- Web Server Hacking (Day 5)
Module 6: 2 Hours – 1 Topic
- Privilege Escalation (Day 6)
Module 7: 2 Hours – 1 Topic
- System Hacking (Day 7)
Module 8: 2 Hours – 1 Topic
- Metasploit (Day 8)
Module 9: 2 Hours – 1 Topic
- Steganography (Day 9)
Module 10: 2 Hours – 1 Topic
- Denial of Service Attack (Day 10)
Module 11: 2 Hours – 1 Topic
- Malware and RAT (Day 11)
Module 12: 2 Hours – 1 Topic
- WiFi Hacking (Day 12)
Module 13: 2 Hours – 1 Topic
- Web Application Scanning (Day 13)
Module 14: 2 Hours – 1 Topic
- SQLi (Day 14)
Module 15: 2 Hours – 1 Topic
- XSS (Day 15)
Module 16: 2 Hours – 3 Topics
- CSRF (Day 16)
- File inclusion (Day 16)
Module 17: 2 Hours – 1 Topic
- Phishing Attack (Day 17)
Module 18: 2 Hours – 1 Topic
- Cryptography (Day 18)
Module 19: 2 Hours – 4 Topics
- Covering Tracks (Day 19)
- IP Spoofing (Day 19)
- Email Spoofing (Day 19)
- MAC spoofing (Day 19)
Module 20: 2 Hours – 1 Topic
- Android Hacking (Day 20)
Module 19: 2 Hours – 4 Topics
- Covering Tracks (Day 19)
- IP Spoofing (Day 19)
- Email Spoofing (Day 19)
- MAC spoofing (Day 19)
Module 20: 2 Hours – 1 Topic
- Android Hacking (Day 20)
Bug Bounty Syllabus
Bug bounty hunting is the act of attaining security vulnerabilities or bugs in a website and responsibly unveiling it to that company’s security team in an efficient and ethical way. Bug bounties are mainly set up by big companies to help people with potential issues discovered on their sites.
If you are engrossed in web application security then we here have a great place of honing your skills. This course is designed from scratch. So, if you do not have any understanding of Website Hacking or Bug hunting then this is a course to go with. Our aim in these 45 days will be to take you from the basics to the master level
This course is totally supported by real-life security vulnerabilities that are reported. This is the place, where people make thousands of dollars during a night by just reporting one big bug too big companies like Uber, Facebook, Ola, Amazon, and Zomato.
So, this course will give you a brief introduction to the types of bugs that you can report and earn the money. With us, you will start as a beginner with no hands-on experience on bug bounty hunting and Penetration testing, but after this course, you will rise as a stealth Bug Bounty Hunter.
Who this course is for:
A beginner or an intermediate person, who wants to find out about cybersecurity, bug hunting, and website hacking process.
Module 1:
- Introduction (Day 1)
- Information Gathering Basic Terminologies (Day 1)
- Introduction of Burpsuite (Day 1)
Module 2:
- Cross Site Scripting (XSS) (Day 2)
- Types of XSS (Day 2)
- How to Hunt for XSS
Module 3:
- Host Header Injection (Day 3)
Module 4:
- URL Redirection / Open Redirection (Day 4)
Module 5:
- Parameter Tampering (Day 5)
Module 6:
- HTML Injection (Day 6)
Module 7:
- Remote File Inclusion (RFI) (Day 7)
- Local File Inclusion (LFI) (Day 7)
Module 8:
- CORS – Cross Origin Resource Sharing (Day 8)
Module 9:
- CSRF – Cross Site Request Forgery (Day 9)
Module 10:
- SSRF – Server Site Request Forgery (Day 10)
Module 11:
- Critical File Found (Day 11)
- Source Code Disclosure (Day 11)
Module 12:
- SQL Injection (Day 12)
Module 13:
- File Uploading (Day 13)
Module 14:
- Hostile Subdomain Takeover (Day 14)
Module 15:
- Command Injection (Day 15)