Advertisement
ZishanAdThandar

Advance Ethical Hacking Course

Jul 6th, 2021 (edited)
106
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.04 KB | Cybersecurity | 0 0
  1. ✅ Security Analyst Topics
  2. ☑️ CIA Triad
  3. ☑️ CISSP Security Fundamentals
  4. ☑️ NIST Security Frameworks
  5. ☑️ OWASP Security Principle
  6.  
  7. ☑️ Security Audits
  8. ☑️ Incidents Response
  9. ☑️ Playbook
  10. ☑️ Security information and event management (SIEM)
  11. ☑️ Security orchestration, automation, and response (SOAR)
  12.  
  13. ☑️ Network LAN WAN
  14. ☑️ Hub Switch Router Modem, Virtualization Tools, Firewall
  15. ☑️ SaaS PaaS IaaS
  16.  
  17. ☑️ Packets
  18. ☑️ TCP UDP
  19. ☑️ TCP/IP Model: Network Access layer, Internet Layer, Transport Layer, Application Layer
  20. ☑️ OSI Model
  21. ☑️ IPV4 IPV6
  22. ☑️ VPN
  23. ☑️
  24. ☑️
  25. ☑️
  26. ☑️
  27. ☑️
  28. ☑️
  29.  
  30. ✅ Web Application Functions
  31. ☑️ HTML Coding
  32. ✔️ Introduction
  33. ✔️ Tags
  34. ✔️ Comments
  35. ✔️ Meta Tags
  36. ✔️ Titles
  37. ✔️ Images
  38. ✔️ Hyperlink
  39. ✔️ Tables
  40. ✔️ Iframe
  41. ✔️ Object
  42. ✔️ Audio
  43. ✔️ Video
  44. ✔️ Many more from w3c
  45. ☑️ CSS Coding
  46. ✔️ Introduction
  47. ✔️ Syntax
  48. ✔️ Selectors
  49. ✔️ Comments
  50. ✔️ Colors
  51. ✔️ Margins
  52. ✔️ Fonts
  53. ✔️ Many more from w3c
  54. ☑️ JavaScript Coding
  55. ✔️ Introduction
  56. ✔️ Statements
  57. ✔️ Syntax
  58. ✔️ Comments
  59. ✔️ Variables
  60. ✔️ Loops
  61. ✔️ Functions
  62. ✔️ Many more form w3c
  63. ☑️ Inspect Element
  64. ✔️ Debugger
  65. ✔️ Console
  66. ✔️ Network
  67. ✔️ Storage
  68. ✔️ Cookies
  69. ✔️ And others
  70. ☑️ Special Tips
  71. ✅ Network+
  72. ☑️ TCP/IP
  73. ☑️ OSI Model
  74. ☑️ TCP UDP Common ports
  75. ☑️ Mac Address
  76. ☑️ Switch
  77. ☑️ Router
  78. ☑️ Bridge
  79. ☑️ and everything from CompTIA Network+
  80. ✅ Linux+ (https://www.comptia.jp/pdf/comptia-linux-xk0-004-exam-objectives.pdf)
  81. ☑️ Directory Structure
  82. ☑️ Bash Shell Commands
  83. ✔️ Piping
  84. ✔️ Grep
  85. ✔️ cut
  86. ✔️ more
  87. ✔️ less
  88. ✔️ curl
  89. ✔️ Others
  90. ☑️ Command Line Common Tools
  91. ✔️ Nano
  92. ✔️ VIM
  93. ✔️ Git
  94. ✔️ Others
  95. ☑️ More from Tutorialspoint
  96. ✅ Understanding Tools (https://www.professormesser.com/security-plus/sy0-501/sy0-501-training-course/)
  97. ☑️ Common Tools in Kali Linux
  98. ☑️ NetCat
  99. ☑️ NMap
  100. ☑️ SQLMap
  101. ☑️ NGROK
  102. ☑️ Metasploit
  103. ☑️ BurpSuite
  104. ✔️ Installation
  105. ✔️ Setup
  106. ✔️ Proxy
  107. ✔️ Repeater
  108. ✔️ Intruder
  109. ✔️ Other Tabs one by one
  110. ✅ Bug Bounty Common Bugs
  111. ☑️ Introduction (bugbountyguide.com)
  112. ☑️ Relfected XSS
  113. ☑️ Stored XSS
  114. ☑️ CSRF
  115. ☑️ SQLi
  116. ☑️ More from Portswigger (https://portswigger.net/web-security)
  117. ✅ Automation
  118. ☑️ Python
  119. ✔️ Introduction
  120. ✔️ Syntax
  121. ✔️ Comments
  122. ✔️ Variables
  123. ✔️ Strings
  124. ✔️ Lists
  125. ✔️ Tupels
  126. ✔️ Modules
  127. ✔️ More from w3c
  128. ☑️ Bash Scripting
  129. ✔️ https://linuxconfig.org/bash-scripting-tutorial-for-beginners
  130. ✅ Packet Capture
  131. ☑️ Wireshark
  132. ☑️ TCP DUMP
  133. ✅ WiFi Hacking
  134. ☑️ Introduction
  135. ☑️ Tools
  136. ✔️ AirCrack-NG
  137. ✔️ WifiPhisher
  138. ✔️ Others
  139. ☑️ Encryption Types
  140. ✔️ WEP
  141. ✔️ WPA
  142. ✔️ WPA2
  143. ☑️ Special Tips
  144. ✅ Common Topics
  145. ☑️ Passive Information Gathering
  146. ☑️ Active Information Gathering
  147. ✅ Advance Topics
  148. ☑️ Buffer Overflow
  149. ☑️ Privilege Escalation
  150. ✔️ Common CVE
  151. ✔️ Use of Metasploit
  152. ✔️ Kernel Exploit
  153. ✔️ linenum
  154. ✔️ searchsploit
  155. ☑️ Working with Exploits
  156. ☑️ Password Attacks
  157. ✔️ John The Ripper
  158. ✔️ Hydra
  159. ✔️ Hashcat
  160. ☑️ Anti Virus Evasion
  161.  
  162.  
  163.  
  164.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement