Topics Covered in this course

Learn slowly to understand each attacks.

Introduction

1. Course Introduction

2. Creating our lab

3. Terminologies

4. Kali Linux in Virtual Box

5. bootable kali linux in USB

6. Learn to compile languages

7. Server and Client concept

8. Creating your first php program

9. Burpsuite Intro

10. xss dom

Attacks Part 1

11. xss reflected

12. xss stored

13. xss + beef = android

14. beef redirection

15. beef windows password

16. wifi - insider

17. wep with aircrack ng

18. wpa with aircrack ng

19. wpa with fern cracker

20. f@ke @ccessp0int

Attacks Part 2

21. Mysql Basics

22. sql injection automated

23. sql injection basics

24. SQL injection step bystep

25. csrf

26. P@ssw0rd Cr@cking Ide@s

27. brutef0rce

28. nmap

29. zenmap

30. info gathering ip scanner

Attacks Part 3

31. info gathering browser tools

32. information gathering website

33. website recon

34. humenerr0r (ph)fishing

35. s0cial medi@ passw0rds

36. Android phone takeover

37. windows system takeover

38. cain and able

39. sniffing

40. d0s- basic windows aftermath

Attacks Part 4

41. d0s- website service

42. information gathering email

43. person info gathering tools

44. ngr installation in kali

45. Lurk!ng a person

46. reverse-engineering

47. Def@cing @ website

48. Command injection @ttack

49. cryptogr@phy

50. steganogr@phy

Anonymizing

51. An0nymizing y0ur computer

Image
Image

Lab Tasks

Basics : 6 Tasks

CSRF : 3 Tasks

BruteForce : 3 Tasks

DOM : 3 Tasks

XSS-REF : 3 Tasks

XSS-STORED : 3 Tasks

SQL-INJECTION : 3 Tasks

SNIFFING : 3 Tasks

CRYPTOGRAPHY : 6 Tasks

STEGANOGRAPHY : 3 Tasks

WIFI : 3 Tasks

REV_ENGINEERING : 3 Tasks

Image
Image
Image

20 Scenario Based Challenges + 50 MCQ Test

INetSecurity.IN ©