Introduction to Offensive networking security, Penetration testing, and Ethical hacking–Types of PenetrationTesting: Network,Web Application,Wireless network, and Physical, Social Engineering.
Testing Methodologies: Blackbox / Whitebox– Intelligence Gathering: Passive Open-Source Information Gathering: OSINT Framework, Email Harvesting, Password Dumps, Maltego
Active Information Gathering: Port Scanning with Nmap, TCP/ UDP Scanning–Threat Modeling– Common Vulnerability Analysis: using Nessus, Banner Grabbing–Web Application Assessment: Exploitation, Burp Suite, SQL Injection, Cross-Site Scripting (XSS)–CVEs, National Vulnerability Database, CWE/SANSTOP25 Most Dangerous Software Errors, CIS:20 Critical Security Controls.
Buffer Overflows: Windows, Linux– Client- Side Attacks–Antivirus Circumvention– Privilege Escalation– Password Attacks– Active –Meta Sploit Framework–Red Team vsBlueTeam, Case Study: Mobile phone security anaylsis, rainbow crack project,, security configuration.