Course curriculum

  • 1

    Introduction

    • Introduction

    • Types of Hacker

    • White Hat Hacking

    • How it all started?

  • 2

    The Origin

    • Phreakers and tiger teams

    • Rise of the black hat hacker

    • Sophisticated modern cybercriminals

    • The renaissance

  • 3

    The Stars of Hacking

    • John Draper

    • Frederick B. Cohen

    • Kevin Mitnick

    • Tsutomu Shimomura

    • Richard Stallman

  • 4

    Phases

    • Phases

    • Phase 1: Reconnaissance

    • Phase 2: Scanning

    • Phase 3: Gaining Access

    • Phase 4: Maintaining Access

    • Phase 5: Clearing Tracks

  • 5

    Welcome to Kali Linux

    • Kali Linux Introduction

  • 6

    Kali linux Tools

    • Information Gathering Tools

    • Vulnerability Analsysis Tools

    • Wireless Attacks

    • Web Applications

    • Exploitation Tools

    • Stress testing

    • Forensic Tools

    • Sniffing and Spoofing

    • Password Attacks

    • Maintaining Access

    • Reverse Engineering

    • Reporting Tools

    • Hardware Hacking

  • 7

    Videos

    • Hiding yourself

    • Cracking passwords

    • Nmap how to use?

    • Kevin Mitnick performing hack

    • Social Engineering Fraud

    • Device Tracing using Kali Linux

  • 8

    Limits of Ethical hacking

    • Stay behind the line.

    • Things an Ethical Hacker should keep in Mind.

  • 9

    Case Studies & Examples

    • Case study: Attempt is as good the Act it self.

  • 10

    Resources

    • Additional Reading

    • External Links / Reference Material

    • Riskpro Video

    • Riskpro Brochure

    • About Riskpro

    • Thank You

  • 11

    Feedback Survey

    • Please Share Your Feedback