Saturday 4 August 2012

Ethical Hacking Syllabus: Beginner Level



  • Where should I start to Learn Hacking
  • What should I do to become a Hacker
  • What are the steps to be followed to become a hacker
  • Are there any pre-requisites to become a Hacker
  • From where did all these Pro Hackers Learn all this cool Stuff
And many more questions. But I never had an answer to them in the beginning. Well I don’t want the fans of Learn Hacking to face the same issues. You should stop asking questions to yourself like :-
  • How to Hack
  • How to become a Hacker
And get started with the Hands on training.
In the previous post of Learn Hacking we told you How to Become a Hacker. Always remember one thing, no one can only motivate you or teach you the basics. Its your will power and practical experience that will help you become an expert Ethical Hacker or I must say a Cyber Security Expert. I like to be called a Cyber Security Expert rather than a Hacker (Personal Choice).


So back to the topic, before moving any further I would like to make one thing very clear. Don’t just rush and start with the basic.
In this post of Learn Hacking we are Going to tell you - Ethical Hacking Syllabus : Beginners Level .
Don’t just rush to learn everything at once. Just start from the beginning of this syllabus and move topic by topic. Pick up one topic and search every bit of it on internet. Google is your best friend for that.  Once you feel that you are done with one topic and confident about your knowledge about that topic, then get practical knowledge regarding the same. Once everything is done, move to the next topic.
So here is the Ethical Hacking Syllabus for you. This is also the Cyber Security Syllabus , beginners level ofcourse.

  •  1 – Introduction
  •  2 – Networking & Basics
  •  3 – Foot Printing
  •  4 – Google Hacking
  •  5 – Scanning
  •  6 – Windows Hacking
  •  7 – Linux Hacking
  •  8 – Trojans & Backdoors
  •  9 – Virus & Worms
  •  10 – Proxy & Packet Filtering
  •  11 – Denial of Service
  •  12 – Sniffer
  •  13 – Social Engineering
  •  14 – Physical Security
  •  15 – Steganography
  •  16 – Cryptography
  •  17 – Wireless Hacking
  •  18 – Firewall & Honeypots
  •  19 – IDS & IPS
  •  20 – Vulnerability
  •  21 – Penetration Testing
  •  22 – Session Hijacking
  •  23 – Hacking Web Servers
  •  24 – SQL Injection
  •  25 – Cross Site Scripting
  •  26 – Exploit Writing
  •  27 – Buffer Overflow
  •  28 – Reverse Engineering
  •  29 – Email Hacking
  •  30 – Incident Handling & Response
  •  31 – Bluetooth Hacking
  •  32 – Mobile Phone Hacking
Use this knowledge wisely and for good only.
hacking talent won’t be responsible for and damage or illicit activity caused by any person reading this post.  
Want to learn more from us, if yes then make sure that you subscribe to http://hackingtalent.blogspot.in/  and become a follower and get regular updates on your email id..:)

http://hackingtalent.blogspot.in/ – Ethical Hacking was never so easy and interesting.


2 comments:

Post a Comment