0% found this document useful (0 votes)
101 views

Roadmap AWS Course - 1

The document outlines a 7 week course on ethical hacking and cyber security. Week 1 covers introduction topics and password cracking methods. Week 2 focuses on open source intelligence and session hijacking. Week 3 looks at denial of service attacks. Weeks 4-5 cover SQL injection and WAF bypass techniques. Week 6 examines server scripts, backdoors, and IP exploits. Week 7 focuses on content management systems and Wordpress exploits.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views

Roadmap AWS Course - 1

The document outlines a 7 week course on ethical hacking and cyber security. Week 1 covers introduction topics and password cracking methods. Week 2 focuses on open source intelligence and session hijacking. Week 3 looks at denial of service attacks. Weeks 4-5 cover SQL injection and WAF bypass techniques. Week 6 examines server scripts, backdoors, and IP exploits. Week 7 focuses on content management systems and Wordpress exploits.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Course Module: Arena Web Security 1

Cyber Security and Ethical Hacking

Roadmap v-2.0

1st week • File Extension Viruses


• What is Ethical Hacking? • Pen Testing for Trojans and Backdoors
• Why we have to Learn Ethical Hacking? • Penetration Testing for Virus
• Ethical Hacking career • All Possible Passwords Cracking Method
• Homework • Password Guessing
• Login Page injection • Default Password
• SQLi • Session Hijacking
• Private exploit of Arena Web Security
2nd week • Compromising Session IDs using Sniffing
• Open Source Intelligence (Live practice)
 Live OSINT project • Compromising Session IDs by Predicting
• Tracking of a target person Session(Project)
• Recover any deleted files. [ PC or Mobile ] o HomeWork
• Cryptography
• Cypher Language
4th and 5th week:
• From Social Media
• SQL Inject
• Web server Whois
• PHP & MySQL Basic
• subdomain
• WAF Bypass (Live practice)
• Reserved IP Location
• POST base SQL Injection
• Which platform used for developing
• Error Base / X-path
• Ping to identify server details
o Home Work
• Collecting Information from Email Header
• Email Tracking Tools
• Evading IDS, Firewalls, and Honeypots 6th week -- 2 classes
• Malware Threats [Virus] • Server Shell script
o Home Work • Web Backdoors
• Shell upload
• Target IP Exploit (Live practice)
3rd week -- 2 classes
• Denial-of-Service
7th week -- 2 classes
• What is a Denial of Service Attack?
• Content Management System
• What Are Distributed Denial of Service Attacks?
• Website Development (Live Project)
• How Distributed Denial of Service Attacks Work
• Wordpress
• Live DDOS
 Wp Exploit (Live)
• What is a Trojan?
 CMS Vulnerability Assessment
• Batch programmer
Copyright © by Arena web security | all right reserved

You might also like