1.1) What is Ethical Hacking?
Β
1.2) Types of Hackers:- White Hat, Black Hat, Grey Hat
Β
1.3) Ethical Hacking vs Malicious Hacking
Β
1.4) Scope and Need of Ethical Hacking
Β
1.5) Legal Framework and Cyber Laws
Β
1.6) Phases of Ethical Hacking:- Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks
2.1 What is a Computer Network?
Β
2.2 Network Types: LAN, WAN, MAN, PAN
Β
2.3 Network Topologies and Protocols
Β
2.4 OSI and TCP/IP Models
Β
2.5 Ports, IP Addressing, and Subnetting
Β
3.1 Routers, Switches, Firewalls, Gateways
Β
3.2 DNS, DHCP, NAT, and MAC
Β
3.3 Packet Structure and Encapsulation
Β
3.4 Public vs Private Networks
Β
3.5 Common Protocols: HTTP, HTTPS, FTP, Telnet, SSH
Sign in to your account