0% found this document useful (0 votes)
25 views11 pages

NewVersionHacker Broschure

Uploaded by

pandeydev806
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views11 pages

NewVersionHacker Broschure

Uploaded by

pandeydev806
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

NewVersion

Hacker

Technology | Cyber security | Learning | Skill | Growth | Future

➢ Advanced Lab ➢ Notes Making Guidance


➢ 60 + Modules ➢ Career Guidance
➢ Recorded Sessions ➢ Assignments
➢ Tests ➢ Bonus Price

WhatsApp Us: Telegram Us:


90215 06065 @Cyberyoddha1
Computer Networking Expert
Module 01: Computer Networking
Module 02: Introduction to Networking
Module 03: IPV4 and IPV6
Module 04: Subnet Mask, CIDR and Subnetting
Module 05: VLSM, Wild Card, Summarization
Module 06: OSI MODEL
Module 07: TCP/IP MODEL
Module 08: Network Devices, Cabling & Packet Tracer
Module 09: ARP and ICMP
Module 10: Packet Flow
Module 11: Routing - Static and Dynamic
Module 12: Static Routing - Next HOP IP & Exit Interface
Module 13: Dynamic - RIP
Module 14: EIGRP
Module 15: OSPF
Module 16: Redistribution
Module 17: Remote Services (Telnet and SSH)
Module 18: DHCP
Module 19: ACL
Module 20: Switching
Module 21: L2 Protocols - CDP, VLAN, STP, DTP, VTP
Module 22: Ether-Channel
Module 23: Port Security
Linux Expert

Module 24: Getting Started with Red Hat Enterprise And Linux
Module 25: Accessing the Command Line
Module 26: Managing Files from the Command Line
Module 27: Getting Help in Red Hat Enterprise Linux
Module 28: Creating, Viewing & Editing Text Files
Module 29: Managing Local Users and Groups
Module 30: Controlling Access to Files
Module 31: Monitoring and Managing Linux Processes
Module 32: Controlling Services and Daemons
Module 33: Configuring and Securing SSH
Module 34: Analyzing and Storing Logs
Module 35: Managing Networking
Module 36: Archiving and Transferring Files
Module 37: Installing and Updating Software Packages
Module 38: Accessing Linux File System
Module 39: Analyzing Servers and Getting Support
Ethical Hacking Professional

Module 40: Introduction to Ethical Hacking


Information Security Overview
Hacking Methodologies and Frameworks
Hacking Concepts
Ethical Hacking Concepts
Information Security Controls
Information Security Laws and Standards

Module 41: Footprinting and Reconnaissance


Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Website Footprinting
Email Footprinting
Whois Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting Tools
Footprinting Countermeasures
Module 42: Scanning Networks
Network Scanning Concepts
Scanning Tools
Host Discovery
Port and Service Discovery
OS Discovery (Banner Grabbing/OS Fingerprinting)
Scanning Beyond IDS and Firewall
Network Scanning Countermeasures

Module 43: Enumeration


Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP and NFS Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures

Module 44: Vulnerability Analysis


Vulnerability Assessment Concepts
Vulnerability Classification and Assessment Types
Vulnerability Assessment Tools
Vulnerability Assessment Reports
Module 45: System Hacking
Gaining Access
Escalating Privileges
Maintaining Access
Clearing Logs

Module 46: Malware Threats


Malware Concepts
APT Concepts
Trojan Concepts
Virus and Worm Concepts
Fileless Malware Concepts
Malware Analysis
Malware Countermeasures
Anti-Malware Software

Module 47: Sniffing


Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Sniffing Tools
Sniffing Countermeasures
Module 48: Social Engineering
Social Engineering Concepts
Social Engineering Techniques
Insider Threats
Impersonation on Social Networking Sites
Identity Theft
Social Engineering Countermeasures

Module 49: Denial-of-Service


DoS/DDoS Concepts
Botnets
DoS/DDoS Attack Techniques
DDoS Case Study
DoS/DDoS Attack Countermeasures

Module 50: Session Hijacking


Session Hijacking Concepts
Application-Level Session Hijacking
Network-Level Session Hijacking
Session Hijacking Tools
Session Hijacking Countermeasures
Module 51: Evading IDS, Firewalls, and Honeypots
IDS, IPS, Firewall, and Honeypot Concepts
IDS, IPS, Firewall, and Honeypot Solutions
Evading IDS
Evading Firewalls
Evading NAC and Endpoint Security
IDS/Firewall Evading Tools
Detecting Honeypots
IDS/Firewall Evasion Countermeasures

Module 52: Hacking Web Servers


Web Server Concepts
Web Server Attacks
Web Server Attack Methodology
Web Server Attack Countermeasures
Patch Management

Module 53: Hacking Web Applications


Web Application Concepts
Web Application Threats
Web Application Hacking Methodology
Web API, Webhooks, and Web Shell
Web Application Security
Module 54: SQL Injection
SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Evasion Techniques
SQL Injection Countermeasures

Module 55: Hacking Wireless Networks


Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Wireless Attack Countermeasures
Wireless Security Tools

Module 56: Hacking Mobile Platforms


Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Mobile Device Management
Mobile Security Guidelines and Tools
Module 57: IoT and OT Hacking
IoT Concepts
IoT Attacks
IoT Hacking Methodology
IoT Attack Countermeasures
OT Concepts
OT Attacks
OT Hacking Methodology
OT Attack Countermeasures

Module 58: Cloud Computing


Cloud Computing Concepts
Container Technology
Serverless Computing
Cloud Computing Threats
Cloud Hacking
Cloud Security

Module 59: Cryptography


Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptanalysis
Cryptography Attack Countermeasures
Module 60: Career Guidance & Resume Building

Advanced Lab Setup


Test After Complete Every Single Module
Particular Assignment of All modules
Providing Recoding of Each Session

Contact Us:
WhatsApp Number: 90215 06065
Telegram Contact: @Cyberyoddha1
YouTube: NewVersionHacker
Instagram: NewVersionHacker
Email: [email protected]
Telegram channel: https://t.me/newversionhackerr

You might also like