Guest User

Arena Web Security Course Outline

a guest
Apr 21st, 2018
27,990
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.52 KB | None | 0 0
  1. ...................Course Outline......................
  2. Course Name: Ethical Hacking
  3. Topic: Ethical Hacking, Cyber Security, Freelancing
  4.  
  5. Contact: Arena Web Security
  6. 01779224640, 01885841489
  7. অফিসঃ Sharif Mansion, 56/57 - Motijheel, Dhaka -1000
  8.  
  9.  
  10.  
  11. Class outline:
  12. ক্লাস সমূহ - Introduction:
  13. What is Ethical Hacking?
  14. Why we have to Learn Ethical Hacking?
  15. Top 5 ways to hack Facebook / Gmail account and recovery
  16. Ethical Hacking career
  17. Homework
  18.  
  19.  
  20.  
  21. Footprinting and Information Gathering:
  22. From Social Media
  23. Web server Whois
  24. subdomain
  25. Reserved IP Location
  26. Which platform used for developing
  27. Ping to identify server details
  28. Collecting Information from Email Header
  29. Email Tracking Tools
  30. Tracking of a target person
  31. Website Cookies history
  32. Recover any deleted files. [ PC or Mobile ]
  33. HomeWork
  34.  
  35. PHP & MySQL Basic:
  36.  
  37. Website Penetration Testing:
  38. What is website Penetration Testing
  39. Website Penetration Testing Tools
  40. Discussion of the different types of vulnerabilities
  41. Defining a web application test scope and process
  42. Defining types of penetration testing
  43. Tools and manual process of penetration testing
  44. Some more ++
  45. HomeWork
  46.  
  47. Website Hacking
  48. Web Attacking method
  49. Sql Injection
  50. Session Hijacking
  51. Private exploit of Arena Web Security
  52. Target Server Exploit
  53. Bypass
  54. Shell upload
  55. Private shell script
  56. Compromising Session IDs using Sniffing
  57. Compromising Session IDs by Predicting Session Token
  58. HomeWork
  59.  
  60. System Hacking
  61. All Possible Passwords Cracking Method
  62. Password Guessing
  63. Default Password
  64. Password Cracking Tools and Script
  65. Keylogger
  66. Spyware
  67. How to Defend Against Keyloggers
  68. HomeWork
  69.  
  70. keylogger Spyware
  71. How to make keylogger Spyware?
  72. How to Bind keylogger file in Real setup File?
  73. Ardamex Keylogger
  74. Hardware Keyloggers
  75. Paid course on keylogger project [free]
  76. HomeWork
  77.  
  78. Malware Threats [Virus]
  79. What is a Trojan?
  80. Batchprogrammer
  81. server shell
  82. File Extension Viruses
  83. Pen Testing for Trojans and Backdoors
  84. Penetration Testing for Virus
  85. HomeWork
  86.  
  87. Website Development:
  88. Wordpress [Basic]
  89. HomeWork
  90.  
  91. Security
  92. Website Security
  93. Web Server security, Cpanel
  94. HomeWork
  95.  
  96. Social Engineering
  97. Pishing
  98. CSRF and XSS
  99. Social Media account recovery process.
  100. Facebook account Hacking ways and Security.
  101. HomeWork
  102.  
  103. Denial-of-Service
  104. What is a Denial of Service Attack?
  105. What Are Distributed Denial of Service Attacks?
  106. How Distributed Denial of Service Attacks Work
  107. Live DDOS attack
  108. HomeWork
  109.  
  110. SQL Injection All method
  111. WAF Bypass
  112. Blind SQL Injection
  113. Error Base
  114. POST base SQL Injection
  115. HomeWork
  116.  
  117. Evading IDS, Firewalls, and Honeypots
  118. RFI/LFI
  119. X-path
  120. Cryptography
  121. HomeWork
  122.  
  123. Scanning Networks web server:
  124. NMAP
  125. VEGA
  126. Acunotix
  127. Prepare Proxies
  128. Proxy Tool
  129. Proxy Tools for Mobile
  130. Free Proxy Servers
  131. Scanning Pen Testing
  132.  
  133. Linux - Kali Linux
  134. HomeWork
  135. VM ware setting
  136.  
  137. Kali Linux Tools
  138. HomeWork
  139. Paid course about Bug Bounty project [ free ]
  140. HomeWork
  141.  
  142. Attack:
  143. Login Page injection
  144. Cross Site Scripting
  145. Bypass it
  146. Authentication Bypass
  147. HomeWork
  148.  
  149. Cross-Site Request Forgery (CSRF)
  150. Bypass
  151.  
  152. Outsourcing in Fiverr / Upwork:
  153. What is Fiverr & Upwork?
  154. What type of work would suit you?
  155. How create a GIG and Sell it?
  156. Fiverr freelancing support.
  157. Order and Payment
  158. Dollar payout process
  159. HomeWork
  160.  
  161. Outsourcing in Hackerone and Bugcroud
  162. How to Hackerone and Bugcroud
  163. First Bug Report in Hackerone and Bugcroud
  164. HomeWork
  165.  
  166. Extra if need:
  167. HTML and CSS Injection
  168. Remote Code Execution and Directory Traversing
  169. Hacking Mobile Platforms
  170. Android keylogger
  171. CCNA Basic
  172.  
  173.  
  174. Contact: Arena Web Security
  175. 01779224640, 01885841489
  176. অফিসঃ Sharif Mansion, 56/57 - Motijheel, Dhaka -1000
Add Comment
Please, Sign In to add comment