Online Mind Mapping and Brainstorming

Create your own awesome maps

Online Mind Mapping and Brainstorming

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account? Log In

CPTS by Mind Map: CPTS
0.0 stars - 0 reviews range from 0 to 5

CPTS

This is just a demo map that you can delete right away, if you feel like it...

SkriptJack

M01 - Business and Technical Logistics of PT

Types of Hackers

Types of attacks

Functionality, and Ease of Use Triangle

Security testing - hint: boxes

Passive information gathering

Active information gathering

Attack Phases

Elements of Security

M02 - Information Gathering

Passive Information Gathering

Competitive Intelligence Gathering

Social Engineering

M03 - Linux Fundamentals

M04 - Detecting Live Systems

Scanning

M05 - Reconnaissance

NetBIOS null sessions

Banner grabbing

Tools to enumerate a system

Data retrievable with Enumeration

M07 - Vulnerability Assessments

M08 - Malware - Software Goes Undercover

Trojans & Backdoors

Bufferoverflows

Denial of Service

Virus and Worms

M09 - Windows Hacking

M10 - Advanced Vulnerability & Exploitation Techniques

M12 - Networks -Sniffing - IDS

Sniffers

IDS

M13 - Attacking Databases

M14 - Attacking Web Technologies

Web Based Password Cracking

M15 - Documentation

M11 - Attacking Wireless Networks

Wireless vs Wired networks

Types of Wireless Networks

Advantages of Wireless Network

Disadvantages of Wireless Network

Wireless Standards

Related tech and Carrier netowkrs

SSID

Terminology

Authentication modes

WEP Encryption

Tools

New node