Basic Topics: Introduction To Information Security
The document provides an overview of basic topics in information security including introductions to information security, network and web technology, information gathering and footprinting, email attacks and security, Google dorks, intrusion detection and protection systems, web application vulnerability assessment and penetration testing, system hacking and security, Kali Linux, network attacks, wireless attacks and security, and mobile attacks and security. It outlines key concepts and tools within each of these areas of information security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
97 views4 pages
Basic Topics: Introduction To Information Security
The document provides an overview of basic topics in information security including introductions to information security, network and web technology, information gathering and footprinting, email attacks and security, Google dorks, intrusion detection and protection systems, web application vulnerability assessment and penetration testing, system hacking and security, Kali Linux, network attacks, wireless attacks and security, and mobile attacks and security. It outlines key concepts and tools within each of these areas of information security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4
Basic Topics
Introduction to Information Security
Introduction Need of Information Security Ethical Side of Hacking Steganography Latest Test Cases Cyber Law & Indian IT Acts
Basics of Network & Web Technology
Introduction IP Address NAT IP Subnets DHCP Server Ports DNS Proxy Servers Virtual Private Networks DNS Server OSI Model Web Architecture Server Configuration HTML Basics PHP Basics
Information Gathering & Foot Printing
Digital Foot Print Information Gathering Who is Information? Web Server Details Reverse IP Mapping People Search Tools to perform Digital Foot Printing
Use Google to craft attacks Advanced operations of Google Advanced operations of Google Find vulnerabilities using Google Security Countermeasures
Intrusion Detection & Protection System, WAF and Honeypots
Introduction to Firewalls Network Firewalls Web Application Firewalls Weakness in Firewalls Intrusion Detection Systems and Weaknesses Intrusion Prevention Systems and Weaknesses Honey Pots and Security Misconfiguration Web Application VAPT Introduction to Web Architecture Web Security Generic Misconception Introduction to DBMS MySQL, MS SQL, Oracle, DB2 Introduction to SQL OWASP Top 1 Attacks Heartbleed Attack Shell Shock / Bash Bug HTTP Response Splitting Denial of Service Attacks Vulnerability Analysis using Burp Suite Arbitrary File Upload Applications to Automate VAPT
System Hacking & Security
OS Login Bypass Malware Illustration Virus, Worms and Trojans Create Malware Evade Antivirus and Firewalls Scan System for Malicious Applications
Introduction to Kali Linux
Install and Setup Introduction to Linux based testing OS System Architecture Network Configuration Essentials Commands
Network Attacks & Security
Introduction to Network Attacks Man in Middle Attack Wireless Attacks & Security Introduction to Wireless Technology MAC Filtering Packet Encryption Packet Sniffing Types of Authentication Types of Attacks
Mobile Attacks & Security
Introduction to Mobile Platforms Security Architecture of Mobile Platforms Introduction to VOIP VOIP calls from any number to any number Fake Calls Android Exploitation Framework