Cyber Security and Ethical Hacking

Iniziamo. È gratuito!
o registrati con il tuo indirizzo email
Cyber Security and Ethical Hacking da Mind Map: Cyber Security and Ethical Hacking

1. Certifications

1.1. 1. CEH(Certified Ethical HAcker)

1.2. 2. CISSP (Certified INforamtion system Security Professional )

1.3. 3. Comptia

1.4. 4. ComptiA Security ++

2. Networking Concepts

2.1. 1. What is Internet

2.2. 2. what is meant by Router, Switch, Hub and Modem

2.3. 3. What are Internet Cabels

2.4. 4. Types of Computer Networks

2.5. 5.Types of Computer Network Architecture

2.6. 6.Network Topology

2.7. 7. OSI Model

2.8. 8. Protocol, Unique Identification Number

2.9. 9. TCP, UDP, DNs Servers

2.10. 10. ARP and RARp

3. Introduction to Cyber security

3.1. 1. Cyber Threats

3.2. 2. Cyber Laws

3.3. 3. Vulnerabilities

3.4. 4. Zero Day Attacks

3.5. 5. Trojen's

3.6. 6. Vpn's

3.7. 7. Botnets

3.8. 8. Kali Linux

3.9. 9. Virus and Worms

3.10. 10. Data Breach

4. Ethical Hacking

4.1. 1. Introduction to Hacking

4.1.1. 1. Types of Hackers

4.1.2. 2. Skills of Ethical Hackers

4.1.3. 3. Threat Modeling

4.1.4. 4. Penetration Testing

4.2. 2. FootPrinting

4.2.1. 1. Foot Printing Through Search engine

4.2.2. 2. Foot Printing Through google Dorks

4.2.3. 3. Email Foot Printing

4.2.4. 4. Website Footprinting

4.2.5. 5. Whois Foot Printing

4.2.6. 6. DNS Foot Printing

4.2.7. 7. Network Foot Printing

4.2.8. 8. Competitive Itelligence

4.2.9. 9. Foot Printing Through Social Engineering

4.3. 3. Scanning

4.3.1. 1. Network Scaning

4.3.2. 2. Tcp

4.3.3. 3. UDP

4.3.4. 4. Communication Protocol

4.3.5. 5. TCp 3-way Handshake

4.3.6. 6. TCP Communication Flags

4.4. 4. Ganning Access

4.5. 5. Maintaning Access

4.6. 6. Clearning Tracks

4.7. 7. Cryptography