Computer Networking- (Ethical Hacking)

1 ) Chapter : Introduction to Ethical Hacking


1.1) What is Ethical Hacking?

 

1.2) Types of Hackers:- White Hat, Black Hat, Grey Hat

 

1.3) Ethical Hacking vs Malicious Hacking

 

1.4) Scope and Need of Ethical Hacking

 

1.5) Legal Framework and Cyber Laws

 

1.6) Phases of Ethical Hacking:- Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks

 

2 ) Chapter : Basics of Computer Networking


2.1 What is a Computer Network?

 

2.2 Network Types: LAN, WAN, MAN, PAN

 

2.3 Network Topologies and Protocols

 

2.4 OSI and TCP/IP Models

 

2.5 Ports, IP Addressing, and Subnetting

 

Chapter 3: Networking Devices and Communication


3.1 Routers, Switches, Firewalls, Gateways

 

3.2 DNS, DHCP, NAT, and MAC

 

3.3 Packet Structure and Encapsulation

 

3.4 Public vs Private Networks

 

3.5 Common Protocols: HTTP, HTTPS, FTP, Telnet, SSH

Exit mobile version