Cyber Security and Ethical Hacking
System Requirements For Cyber Security and Ethical Hacking Lab:
- 8 GB (Gigabytes) of RAM or higher (16 GB recommended)/No Graphics card Required
- 64-bit system processor is mandatory
- 20 GB or more disk space
- Enable virtualization technology on BIOS settings, such as “Intel-VTx”
- Modern Browsers like Google Chrome (latest), Mozilla Firefox (latest), Microsoft Edge (latest) and Skype
- All items referenced in this course are either free or is available on my blog linuxtiwary.com
- A computer or Laptop for installing all the free software and tools needed to practice
- A strong desire to understand hacker tools and techniques
- Be able to download and install all the free software and tools needed to practice
- A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world
- Headphone with Mic and an Internet connection of at least 2mbps
Cyber Security and ethical Hacking Lab Setup :
Installation and Configuration of Virtualization Technology
Windows Installation inside VirtualBox
Linux (RedHat) Installation inside VirtualBox
Kali Linux Installation
Different Type of Network settings
Remote Support Through Virtualization
Virtualization extensions
Windows Operating System:
Basics of Windows
File and Folder Management in Windows
User Management in Windows
Disk Management
File and Folder Security
Disk Security
USB Security
Registry Editor
Group Policy Editor
Network Setup and Testing
Information gathering
Processor Hacking
Memory Management in Windows(virtual memory)
Malware Detection
System Performance
System Monitoring
Windows Password Hacking and Bypass
USB as RAM
Virtual hard Disk
Encrypting Virtual Hard Disk
Virtual Machines
Virtual Machine Weaknesses
Virtual Machine Hardening
Whonix OS – Anonymous Operating system
Whonix OS – Weaknesses
Qubes OS
Goals and Learning Objectives
The Importance of Patching
Windows 7 – Auto Update
Windows 8 & 8.1 – Auto Update
Windows 10 – Auto Update
Windows – Criticality and Patch Tuesday
Windows 7, 8, 8.1 & 10 – Automate the pain away from patching
Linux – Debian – Patching
Mac – Patching
Firefox – Browser and extension updates
Chrome – Browser and extension updates
IE and Edge – Browser and extension updates
Removing Privilege
Windows 7 – Not using admin
Windows 8 and 8.1 – Not using admin
Windows 10 – Not using admin
Auto updates – The Impact to privacy and anonymity
Security Domains, Isolation and Compartmentalization
CCNA Training Modules:
Introduction to computer Network
network Attacks
What is “Protocol”
Reference Models
OSI Reference Model
OSI vs TCP/IP
Demonstration using Wireshark
Standards & Protocols
Ethernet: Principles, Frame & Headers
ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets
ARP Hand-On Practices
VLANs – Virtual Local Area Networks
WLANs – Wireless Local Area Networks
Introduction to Network Layer
Internet Protocol – IP
IPv4 Adressing System
IPv4 Packet Header
IPv4 Subnetting: Classful Networks
IPv4 Subnetting: Subnet Mask
IPv4 Subnetting: Understanding
IPv4 Shortage
Private Networks
Private Networks – Demonstration
NAT – Network Address Translation
IPv6, Packet Header & Addressing
DHCP – How the Mechanism Works
ICMP – Internet Control Message Protocol
Traceroute
Introduction to Transport Layer
TCP – Transmission Control Protocol
TCP Header
UDP – User Datagram Protocol
Introduction to Application Layer
DNS – Domain Name System
HTTP ( Hyper Text Transfer Protocol )
HTTPS
TCP/IP Model and Internet
Introduction to Cisco Packet Tracer
Understand Network Topology
Understand wires and cables used in networking
Difference between Hubs- switches and Routers
IP Address brief
Types of Address
IPV4 addressing
binary conversion
Network Architecture
LAN MAN WAN SAN
understand DHCP server working
Understand DNS Server working
Understand FTP Server working
Understand SMTP and POP3 Server working
Understand NTP Server working
Understand HTTP and HTTPS Server working
Understand Syslog Server working
DHCP DNS FTP HTTP SMTP POP3 combined LAB
Router Components
Components of routers
RAM NVRAM and FLASH Memory
Introduction to cisco IOS
IOS Modes on Cisco Devices
User EXEC mode
Privileged EXEC mode
Configuration mode
Interface Configuration mode
• Line Configuration mode
• Router Configuration mode
Enable Passwords
Line Passwords and Configuration
assign an IP address to an interface:
Assign secondary ip address on an Interface
Managing Configuration Files
running-config
startup-config
view the contents of the running-config and startup-config files
delete the contents of the startup-config file:
change the host name of your router
assign a description to an interface for documentation purposes
create a banner message which users will see when logging into an IOS device
Need of routing
Routing Configuration
Routing very basic Lab
Static Routing Configuration
Default Routing Configuration
Static with Default Routing with configuration
Router Loopback Interfaces
Dynamic Routing
Difference between Static and Dynamic routing
RIP Routing Configuration
RIPv1 and RIPv2
EIGRP Configuration Lab
EIGRP configuration with same AS value
EIGRP Configuration with different AS Value
OSPF Configuration basic Lab
OSPF configuration with single AREA
OSPF Configuration with Multi Area or Multi Area OSPF Lab
Router as a DHCP server
Router as a DHCP Client
Router as a Multiple DHCP Server
Switch Basics
Assign IP Address on Switch
Gateway IP on Switch
VLAN creation and Deletion on SWITCH
VTP
Multi user Lab using SWITCH
Telnet Configuration on switch
SSH configuration on switch
SWITCH SECURITY
enable password on switch
enable secret on switch
service password-encryption
PPP
Password Authentication Protocol configuration
CHAP configuration
ACL Configuration Lab
NAT configuration Lab
Removing IP Address from router Interfaces
Remove wrong Routing Configuration From router
Router Configuration Backup and Restore using TFTP Server
Router Configuration Backup and Restore using FTP Server
Linux Essential (Red-hat Enterprise Linux)
Red Hat Enterprise Linux basics and it’s variants
Design Classroom Network Using Virtualization Technology For Lab Practice.
Virtual-box installation and configuration.
VirtualBox Network Adapter settings.
Vmware Installation and Configuration.
Vmware Network Adapter settings.
Linux Files and Folder.
Copying files and folders in Linux.
Moving and Renaming Files and Folders in Linux.
Determining File Content.
Creating Fake files with desired size.
Standard input/output to a file.
Searching files and Folders in Linux.
Vim editor
Nano Editor
Writing shell script in Linux.
samples of shell scripting with examples.
Scripting:for Loops
Scripting:if statements
Spell check with Aspell command line tool.
Permission Types in Linux.
Changing files and Folder Permissions.
Special Permissions for files and folders in Linux.
Changing User ownership and group ownership.
Symbolic and Numeric Method.
Soft Linking and hard Linking Files and Folders in Linux.
User and Group Management in Red Hat Enterprise Linux.
User management tools.
System users and groups.
Shell scripting for user management
shell scripting for user and group management
shell scripting for user and password management.
Different methods to Lock users in Linux.
Different Methods to Unlock Users in Linux.
Different methods to enable/Disable users in Linux.
Linux File System.
Partition creation and Deletion in Linux.
Linux File System Up-gradation and Degradation.
Swap Partition creation and Deletion.
Swap File Creation and Deletion.
Linux Server Configuration Labs
Xinetd Managed Services in Red Hat Enterprise Linux.
Telnet server
Secure Telnet server
Telnet Proxy
Proxychain For Telnet
Service and Application Access Controls in Linux.
Initialization Script Management.
Package Management in Linux using RPM and YUM.
Yum Local and Remote Server.
Network Configuration and Management in Linux.
Forward Lookups and Reverse Lookups
Exploring DNS with HOST.
Network File Service Configuration and Management.
NFS Server and NFS Clients and it’s utilities.
Samba service configuration and management.
TFTP Server Configuration
Uploading and Downloading Files through TFTP
File Transfer Protocol Configuration and Management.
Printer Configuration in Linux.
Apache Server configuration in Linux.
Apache Namespace configuration in Linux.
Virtual Hosting.
Proxy server Configuration for Your Web Server
Simple Mail Transfer Protocol Configuration and Management.
Squirrelmail and PHP.
Incoming sendmail configuration and outgoing sendmail configuration.
Postfix mail server configuration.
Dovecot configuration.
Web Based Mailing Service Live Project.
IMAP and POP3
OpenSSH Server configuration
scp:secure file transfer
Finger Server Configuration
Chat Server
Server Security labs :
SSH security
Telnet Security
IP Based Security
Network based Security
Time Based Security
Connection Based Security
Load Balancing
Apache Server Security
Checksum and verification
Clear Cache memory
md5sum and sha1sum
generate audit reports
Audit report about Linux Users
Report about Configuration changes
Report about logins
Report about account modifications
Successful Logins
Login summary Report
Records of bad Login attempts
FIREWALL and TCPWRAPPER Training :
Basics of IPTABLES
Configuration file for IPTABLES
File settings for IPTABLES
Firewall services
Allow or Deny Incoming Request
Allow or Deny Outgoing Request
block or allow certain IP Address
block or allow certain network Address
Block all ICMP incoming traffic
Block or allow all FTP/HTTP incoming traffic
Create user defined chain
Delete user defined chain
Allow or Block particular PORT or service for particular IP Address or Network Address
Rename user defined chain
Log firewall rules
Backup or Restoring rules in iptables.
MAC address level filtering
TCP/UDP Port Filtering
Iptables configuration
Iptables services
ACL syntax for iptables
Iptables basic commands
Appending/Inserting rules
Replace rules for firewall
Firewall Backup and Restoring rules using Iptables
flush all chains PREROUTING FORWARD INPUT OUTPUT POSTROUTING
zero counters in Firewall
erase user created chains
allow icmp or ping protocol
open ssh port using Firewall
VNC client port using Frewall
Webserver:create rules to allow all traffic on port 80 and 443.
multiport allow or deny using Firewall
MAC address level filtering
Iptables log
allow Samba in iptables
configure NFS services to use fixed ports.
configure firewall to allow nfs traffic
TCPWRAPPER BASICS
BLOCK/ALLOW IP ADDRESS or Network Address through TCPWRAPPER
Block or Allow Particular service
Block or alow Particular Service for particular IP or Network.
Ethical hacking with Kali Linux and Penetration Testing
Install Kali Linux Graphically.
Setup Kali Linux Network Lab with Virtualization Technique.
Install Windows and RedHat Enterprise Linux as Client Machine.
Create and Configure a Bridge and Internal Network between all OS.
Files and Folder Creation ,Deletion and Renaming in Kali Linux.
Updating, Upgrading, Distro Understanding in kali Linux.
Kali Linux Administration.
Networking basics in Kali Linux.
Network Scanning in Kali Linux.
Network Monitoring in Kali Linux.
PostgreSQL Service
Creating a Workspace …………………………………………………………………
Database Nmap Scan …………………………………………………………………..
Hosts Database……………………………………………………………………………
Services Database ……………………………………………………………………….
Vulnerabilities Database …………………………………………………………….
Credentials Database …………………………………………………………………
Renaming Workspace ………………………………………………………………..
Deleting a Workspace ……………………………………………………………….
Verbose Details of Workspaces ………………………………………………….
Exporting Workspace ………………………………………………………………..
Deleting all Workspaces………………………………………………….
Importing Hosts………………………………………………………………
Listing Hosts in Database ……………………………………………………
Adding Hosts ………………………………………………………………
Deleting a host ……………………………………………………………….
Exporting Hosts Database …………………………………………………………..
Search and Tag Hosts ……………………………………………………………..
Filter Search……………………………………………………………………
Deleting Services of a Host…………………………………………………………
Filter Search…………………………………………………………………..
Port Specific Services……………………………………………………………
Exporting Services Database ………………………………………………………
Search Services………………………………………………………………….
Port Specific Vulnerabilities……………………………………………………
Service Specific Vulnerabilities ………………………………………………..
Host Specific Vulnerabilities………………………………………………….
Exporting Vulnerabilities Database………………………………………………
Loot Database ………………………………………………………………………….
Search Loot……………………………………………………………………….
Type Specific Loot……………………………………………………………………..
Deleting Loot……………………………………………………………………………
Metasploit configuration
Hack Telnet server using Metasploit.
Hack SSH Server using Metasploit.
HACK FTP Server using Metasploit.
Hack HTTP/WEB Server using Metasploit.
Metasploit and everything HTTP
Foot printing Concepts
• Footprinting Methodology
• Footprinting through Search Engines
• Footprinting through Web Services
• Footprinting through Social Networking Sites
• Website Footprinting
• Email Footprinting
• Whois Footprinting
• DNS Footprinting
• Network Footprinting
• Footprinting through Social Engineering
• Footprinting Tools
• Footprinting Countermeasures
Scanning Networks • Network Scanning Concepts
• Scanning Tools
• Host Discovery
• Port and Service Discovery
• OS Discovery (Banner Grabbing/OS
Fingerprinting)
• Scanning Beyond IDS and Firewall
• Draw Network Diagrams
Enumeration • Enumeration Concepts
• NTP and NFS Enumeration
• SMTP and DNS Enumeration
• Other Enumeration Techniques (IPsec,
Unix/Linux, Telnet, FTP, TFTP, SMB, IPv6,
enumeration)
• Enumeration Countermeasures
Web Server Concepts
• Web Server Attacks
• Web Server Attack Methodology
• Web Server Attack Tools
• Web Server Countermeasures
• Patch Management
• Web Server Security Tools
gathering website info
discovering technologies used on the website
gathering DNS information
Discovering subdomains
discovering sensitive files
Analyzing Discovered Files
Browser Security
Chrome security
Firefox Security
Hacking With Kali Linux
Setup Client Machines and Targets for Hacking.
Hacking FTP using Hydra.
Hacking SSH using Hydra.
Hacking WEB Services using Hydra.
Database Hacking and Password Attacks using Kali Linux
Learn to Download and use Dictionary attack.
Port Scanning using Nmap
IP and Network Scanning
DNS Footprinting
DNS Enumeration
Hacking facebook using Social Engineering
Hacking Gmail using Social Engineering
Zen map tool
DNSenum
DNSdict
Harvestor usage
DNSrecon
Generating Word list for hacking
information gathering using dmitry tool
information gathering using netdiscover
information gathering using sparta
Password Attacking through Hydra
Password Attacking through Medusa
Password Attacking through John
Password Attacking through Crunch
Password Attacking through Cewl
Scanning Web Application and web sites using wpscan
Scanning Web Application and web sites using cmseek
Website Information Gathering
Scan Website Vulnerability
Nikto (Website Information Gathering Tool)
Understand Hashing Algorithm
Crack Hash Algorithms
WordPress Security Scanner
Finding emails for Hacking
Learn Wireshark Tool
Learn Tshark Network Monitoring Tool
System Security using Kali Linux.
Encrypt File and Folder using Kali Linux.
Openssl tool for cryptography
gpg- encryption
Vim Editor Security.
Hide your Real IP from Hackers.
Security Audit using Lynis (Automated Security Testing)
rootkit Scanning
Antivirus installation and usage in Kali Linux.
Encrypting Encrypting ZIP file.
Hiding text inside Images
Cyber Forensic using Windows
You may be also interested in
Register for FREE Demo
Fields marked with (*) are mandatory
Client Feedback
Thanks, you guys provided the best online training in SAP BODS. The hands on training is very informative and helpful.
- David Sergi, Camaga Ltd; U.K