Hacking ka blueprint
post by:-mahendra kumar
INTRODUCTION.
Hacking computers ka ek part hai pichle 50 saalo se aur ye ek bhot bada topic hai. Sabse pehla hacking event MIT me hua tha 1960 ke waqt aur ussi time hacker term originate hua tha.
Iss course me mai apko hacking ke saare concepts explain karunga aur bataunga ki aap kaise aap unhe real time environment me use kar sakte hain.
AUDIENCE
Ye course unn sab audience ke liye hai jinhe hacking me interest hai aur wo apna career ethical hacking me banaana chahte hain.
PREQUISITES (KYA PEHLE SE PATA HONA CHAHIYE)
Iss tutorial ko start karne se pehle apko computer ke baare me basic knowledge aur wo ek network me kaise work karta hai uski jaankari honi chahiye.
BLUEPRINT
1. ETHICAL HACKING − OVERVIEW
2. ETHICAL HACKING − HACKER TYPES
3. ETHICAL HACKING − FAMOUS HACKERS
4. ETHICAL HACKING − TERMINOLOGIES
5. ETHICAL HACKING − TOOLS
6. ETHICAL HACKING − SKILLS
7. ETHICAL HACKING − PROCESS
8. ETHICAL HACKING − RECONNAISSANCE
9. ETHICAL HACKING − FOOTPRINTING
10. ETHICAL HACKING − FINGERPRINTING
11. ETHICAL HACKING − SNIFFING
12. ETHICAL HACKING − SNIFFING TOOLS
13. ETHICAL HACKING − ARP POISONING
14. ETHICAL HACKING − DNS POISONING
15. ETHICAL HACKING − EXPLOITATION
16. ETHICAL HACKING − ENUMERATION
17. ETHICAL HACKING – METASPLOIT
18. ETHICAL HACKING – TROJAN ATTACKS
19. ETHICAL HACKING – TCP/IP HIJACKING
20. ETHICAL HACKING – EMAIL HIJACKING
21. ETHICAL HACKING – PASSWORD HACKING
22. ETHICAL HACKING – WIRELESS HACKING
23. ETHICAL HACKING − SOCIAL ENGINEERING
24. ETHICAL HACKING − DDOS ATTACKS
25. ETHICAL HACKING – CROSS-SITE SCRIPTING
26. ETHICAL HACKING – SQL INJECTION
27. ETHICAL HACKING – PEN TESTING.
No comments:
Post a Comment
Aap Hame Comment Kar Sakte Hai Aap Ka Hamari Blog Main Suwagat Hai