0% found this document useful (0 votes)
97 views4 pages

Basic Topics: Introduction To Information Security

The document provides an overview of basic topics in information security including introductions to information security, network and web technology, information gathering and footprinting, email attacks and security, Google dorks, intrusion detection and protection systems, web application vulnerability assessment and penetration testing, system hacking and security, Kali Linux, network attacks, wireless attacks and security, and mobile attacks and security. It outlines key concepts and tools within each of these areas of information security.

Uploaded by

TanujSood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views4 pages

Basic Topics: Introduction To Information Security

The document provides an overview of basic topics in information security including introductions to information security, network and web technology, information gathering and footprinting, email attacks and security, Google dorks, intrusion detection and protection systems, web application vulnerability assessment and penetration testing, system hacking and security, Kali Linux, network attacks, wireless attacks and security, and mobile attacks and security. It outlines key concepts and tools within each of these areas of information security.

Uploaded by

TanujSood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Basic Topics

Introduction to Information Security


Introduction
Need of Information Security
Ethical Side of Hacking
Steganography
Latest Test Cases
Cyber Law & Indian IT Acts

Basics of Network & Web Technology


Introduction
IP Address
NAT
IP Subnets
DHCP Server
Ports
DNS
Proxy Servers
Virtual Private Networks
DNS Server
OSI Model
Web Architecture
Server Configuration
HTML Basics
PHP Basics

Information Gathering & Foot Printing


Digital Foot Print
Information Gathering
Who is Information?
Web Server Details
Reverse IP Mapping
People Search
Tools to perform Digital Foot Printing

Email Attacks & Security


Phishing Attacks Desktop Phishing, Spear phishing
IDN Homograph Attack
Social Engineering
Fake Emails
Identify Fake Emails
Key Loggers
Email Encryption
Security Counter Measures

Google Dorks Database


Use Google to craft attacks
Advanced operations of Google
Advanced operations of Google
Find vulnerabilities using Google
Security Countermeasures

Intrusion Detection & Protection System, WAF and Honeypots


Introduction to Firewalls
Network Firewalls
Web Application Firewalls
Weakness in Firewalls
Intrusion Detection Systems and Weaknesses
Intrusion Prevention Systems and Weaknesses
Honey Pots and Security Misconfiguration
Web Application VAPT
Introduction to Web Architecture
Web Security Generic Misconception
Introduction to DBMS MySQL, MS SQL, Oracle, DB2
Introduction to SQL
OWASP Top 1 Attacks
Heartbleed Attack Shell Shock / Bash Bug
HTTP Response Splitting Denial of Service Attacks
Vulnerability Analysis using Burp Suite
Arbitrary File Upload
Applications to Automate VAPT

System Hacking & Security


OS Login Bypass
Malware Illustration Virus, Worms and Trojans
Create Malware
Evade Antivirus and Firewalls
Scan System for Malicious Applications

Introduction to Kali Linux


Install and Setup
Introduction to Linux based testing OS
System Architecture
Network Configuration
Essentials Commands

Network Attacks & Security


Introduction to Network Attacks
Man in Middle Attack
Wireless Attacks & Security
Introduction to Wireless Technology
MAC Filtering
Packet Encryption
Packet Sniffing
Types of Authentication
Types of Attacks

Mobile Attacks & Security


Introduction to Mobile Platforms
Security Architecture of Mobile Platforms
Introduction to VOIP
VOIP calls from any number to any number Fake Calls
Android Exploitation Framework

You might also like