Cybersecurity (Ethical Hacking)
Delve into a world of Hackers. Learn what is takes to kill it in the Cyber Security Industry..
350,000.00 ₦
350000.0
NGN
350,000.00 ₦
Responsible | Victory Okoroma |
---|---|
Last Update | 02/28/2025 |
Completion Time | 1 hour 15 minutes |
Members | 0 |
-
Introduction to Cyber Security6Lessons · 1 hr 15 min
-
Week 1: Getting Started
-
Introduction to Cybersecurity and Ethical hacking
-
Types of hackers and Phases of hacking
-
The CIA Triad and Kill-Chain
-
Practical on making a pendrive bootable and a live view of Linux
-
Basic Terminologies in Hacking and basic pendrive hack(Practical)
-
-
Week 2: Introduction to Hacking4Lessons ·
-
Introduction to Linux, it’s distributions and why we use it.
-
Setting up Kali Linux and Virtual Machines(practical )
-
Basic Linux commands and installation of tools(practical)
-
Network Interfaces and User Permissions (practical)
-
-
Week 3: Staying Anonymous and Scripting4Lessons ·
-
Proxychains (practical) and Virtual private networks
-
Private Browsers and Private Search Engines
-
Introduction to Bash Scripting and its likes
-
Tips for staying safe online (practical)
-
-
Week 4: Cryptography and Firewalls3Lessons ·
-
Introduction to cryptography, Forms of Cryptographic Attacks and practical
-
Firewalls, types and setting it up on Linux
-
Introduction to Hackthebox free labs practical(tier 0,1 and 2)
-
-
Week 5: Malware Analysis3Lessons ·
-
Definition of malwares and its types
-
Practical view of the keylogger kind of malwares
-
Spotting malware presence on devices
-
-
Week 6: Basic Networking3Lessons ·
-
IP Address (practical)
-
Mac Address (practical)
-
Network topology and Network Sniffing using Bettercap (practical) and Steganography (practical)
-
-
Week 7: Social Engineering4Lessons ·
-
Introduction to Social Engineering
-
Types and forms of social engineering(practical )
-
How to identify social engineering
-
Why social engineering works
-
-
Week 8: Reconnaissance and Foot-Printing Phase4Lessons ·
-
Introduction to Reconnaissance/Foot--printing and Types
-
Google Dorks (practical)
-
Dumpster Diving and use of tools(Practical)
-
Giving a target to footprint (Presentation)
-
-
Week 9: Vulnerability Research and Scanning Phase4Lessons ·
-
Nmap (practical)
-
Nikto (practical)
-
Owasp zap (practical)
-
Gobuster(Practical)
-
-
Week 10: Exploiting and Gaining Access Phase4Lessons ·
-
MySQL injection (practical)
-
Man-in-the-middle-attack (practical)
-
Social Engineering Toolkit (practical)
-
Wireshark(http and Sniffing) (practical)
-