0% found this document useful (0 votes)
87 views4 pages

Academor 3

This document provides an overview of several cyber security modules, including introductions to types of hackers, hacking phases, information security concepts like CIA (confidentiality, integrity, authentication), and components of cybersecurity such as networking fundamentals and security frameworks. Key topics covered include white hat and black hat hackers; hacking footprinting, scanning, access, and covering tracks phases; setting up a virtual lab with VMWare, Kali Linux, and Metasploitable 2; network types like LAN and WAN; IP addressing including private and public IPs; IP versions like IPv4 and IPv6; firewall types; and vulnerability scanning tools like Nmap and Nessus.

Uploaded by

KSHITIJ VERMA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views4 pages

Academor 3

This document provides an overview of several cyber security modules, including introductions to types of hackers, hacking phases, information security concepts like CIA (confidentiality, integrity, authentication), and components of cybersecurity such as networking fundamentals and security frameworks. Key topics covered include white hat and black hat hackers; hacking footprinting, scanning, access, and covering tracks phases; setting up a virtual lab with VMWare, Kali Linux, and Metasploitable 2; network types like LAN and WAN; IP addressing including private and public IPs; IP versions like IPv4 and IPv6; firewall types; and vulnerability scanning tools like Nmap and Nessus.

Uploaded by

KSHITIJ VERMA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

7/3/23

Module 1
========

Intro to Cyber Security


-----------------------

Mr. Robot

Telegram

Types of Hacker
---------------
White Hat Hacker - Ethical Hacker
Black Hat Hacker - Unethical Hacker
Gray Hat Hacker - Both White and Black

https://pranx.com/hacker/

Open your CMD


COMMAND: color a

Facebook ---> Database (Storage)

raj
raj123

bank
raj
raj123

Security?
Change Password
2 Factor Authentication

Hacking Phases
--------------

Footprinting Reconnaissance / Info Gathering


Scanning
Gaining Access
Maintaining the Access
Clearing Tracks

Hack facebook account = Email, passsword

Skill,

Google, Facebook

Dummy Target ->

Hacking Lab

Virtual Lab Setup


-----------------
VMWare
Kali Linux
Windows 7,10
Metasploitable2

---------------------------------------------------------------------
9/3/23

Module 2
========

Information Security
--------------------

CIA

Lab Setup
---------

VMWare = https://www.vmware.com/go/getworkstation-win
(MC60H-DWHD5-H80U9-6V85M-8280D)

Kali Linux = https://cdimage.kali.org/kali-2022.4/kali-linux-2022.4-vmware-amd64.7z

7 zip = https://www.7-zip.org/a/7z2201-x64.exe

Metasploitable 2 =
https://sourceforge.net/projects/metasploitable/files/latest/download

Task: Setup your lab.

-----------------------------------------------------------------------------------
----
13/3/23

Module 3
========

History of Cyber Security


-------------------------

VMware
Virtual Box

VMware fusion

Kali Linux
Parrot OS
Black Arch

Ubuntu

Android = Linux
MAC Book = Linux
IOS = Linux
Router = Linux
CCTV = Linux

------
Name, DOB, PHONE, EMAIL, ADDRESS, A/C, Card no., Pet name, GF Name, GF DOB, GF
phone, Family, etc..
Domain, Subdomain, IP,

-------------------------------------

[email protected]
djfsdfs

[email protected]
djfsdfs

---------------------------
[email protected]
[email protected]
[email protected]

[email protected]
------------------------------------------------------------------------
16/3/23

Module 4
========

Components of Cybersecurity
---------------------------

Networking
----------

Types of Network
----------------
LAN = Local Area Network

WAN = Wide Area Network

IP Address
----------
Types of IP
Private IP (No Internet)
Public IP (Inernet)

Private IP Check = Open CMD > ipconfig (Windows)


Open Terminal > ifconfig (Kali Linux)

Public IP Check = Search on google : "what is my public ip"


https://www.whatismypublicip.com/

IP Versions
-----------
IPv4 = 192.168.1.5
4 Octet
0-255
0.0.0.0
255.255.255.255
4 Bilion

IPV6 = 3001:0da8:75a3:0000:0000:8a2e:0370:7334
8 Octet
Firewall
--------
Types of Firewall
Hardware Based
Software
Host based
Network based

-----------------------------------------------------
20/3/23

Module 5
========

Cyber Security Frameworks


-------------------------

Nmap, Nessus

https://www.tenable.com/products/nessus/nessus-essentials?action=register

Nessus
-------
Install
cd Downloads
sudo dpkg -i Nessus.deb
service nessusd start
(open browser)
https://localhost:8834

You might also like