Cyber Security and Ethical Hacking

Get Started. It's Free
or sign up with your email address
Cyber Security and Ethical Hacking by Mind Map: Cyber Security and Ethical Hacking

1. Certifications

1.1. 1. CEH(Certified Ethical HAcker)

1.2. 2. CISSP (Certified INforamtion system Security Professional )

1.3. 3. Comptia

1.4. 4. ComptiA Security ++

2. Networking Concepts

2.1. 1. What is Internet

2.2. 2. what is meant by Router, Switch, Hub and Modem

2.3. 3. What are Internet Cabels

2.4. 4. Types of Computer Networks

2.5. 5.Types of Computer Network Architecture

2.6. 6.Network Topology

2.7. 7. OSI Model

2.8. 8. Protocol, Unique Identification Number

2.9. 9. TCP, UDP, DNs Servers

2.10. 10. ARP and RARp

3. Introduction to Cyber security

3.1. 1. Cyber Threats

3.2. 2. Cyber Laws

3.3. 3. Vulnerabilities

3.4. 4. Zero Day Attacks

3.5. 5. Trojen's

3.6. 6. Vpn's

3.7. 7. Botnets

3.8. 8. Kali Linux

3.9. 9. Virus and Worms

3.10. 10. Data Breach

4. Ethical Hacking

4.1. 1. Introduction to Hacking

4.1.1. 1. Types of Hackers

4.1.2. 2. Skills of Ethical Hackers

4.1.3. 3. Threat Modeling

4.1.4. 4. Penetration Testing

4.2. 2. FootPrinting

4.2.1. 1. Foot Printing Through Search engine

4.2.2. 2. Foot Printing Through google Dorks

4.2.3. 3. Email Foot Printing

4.2.4. 4. Website Footprinting

4.2.5. 5. Whois Foot Printing

4.2.6. 6. DNS Foot Printing

4.2.7. 7. Network Foot Printing

4.2.8. 8. Competitive Itelligence

4.2.9. 9. Foot Printing Through Social Engineering

4.3. 3. Scanning

4.3.1. 1. Network Scaning

4.3.2. 2. Tcp

4.3.3. 3. UDP

4.3.4. 4. Communication Protocol

4.3.5. 5. TCp 3-way Handshake

4.3.6. 6. TCP Communication Flags

4.4. 4. Ganning Access

4.5. 5. Maintaning Access

4.6. 6. Clearning Tracks

4.7. 7. Cryptography