Cyber Infrastructure Attacks
Description
n this course, you will take your first steps in Cyber Security! The lessons will guide you through the initial stage of an attack, in which information is gathered, and then you will learn how to make your way into the organization. You will be introduced to network data analysis, and how to make sure you are not discovered when involved in offensive cyber activity. This course features hands-on simulations provided by @Cywar – a gamified training and assessment platform by HackerU Solutions.
Prerequisites:
- Basic knowledge of the Linux OS
- Basic knowledge of the Windows OS
- Basic knowledge of networking
Module 1
Wireshark
-Wireshark usage
-Capture data on a network
-Analyzing data using Wireshark
Module 2
Footprinting And Reconnaissance
-Search engines
-People search
-Google Hacking DB
-Website footprinting
-Information gathering
Module 3
Network Scan
-Network layout & Services
-TCP & UDP handshake
-Port scan
-IDLE scan
-Firewall & IDS evasion
-Automation Scan
Module 4
Password Cracking
-Attack types
-Hash types
-Local cracking
-Remote Cracking
Wi-Fi Attack
Wifi Attack
-Wi-Fi encryption
-EAPOL protocol
-Automated Frameworks
-Data snif
-Rouge Access Point
Men In The Middle
-MITM Attack
-Arp Spoof
-DNS spoof
-Bypassing SSL
-MITM Automated Frameworks
Hacking Frameworks & Automation
-Terminology
-Search Engines
-Automated Frameworks
-Creating malicious files
Anonymity On The Network
-Proxy
-VPN
-Proxy chain
-TOR