Computer Networking- (Ethical Hacking)

1 ) Chapter : Introduction to Ethical Hacking


1.1) What is Ethical Hacking?

Β 

1.2) Types of Hackers:- White Hat, Black Hat, Grey Hat

Β 

1.3) Ethical Hacking vs Malicious Hacking

Β 

1.4) Scope and Need of Ethical Hacking

Β 

1.5) Legal Framework and Cyber Laws

Β 

1.6) Phases of Ethical Hacking:- Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks

Β 

2 ) Chapter : Basics of Computer Networking


2.1 What is a Computer Network?

Β 

2.2 Network Types: LAN, WAN, MAN, PAN

Β 

2.3 Network Topologies and Protocols

Β 

2.4 OSI and TCP/IP Models

Β 

2.5 Ports, IP Addressing, and Subnetting

Β 

Chapter 3: Networking Devices and Communication


3.1 Routers, Switches, Firewalls, Gateways

Β 

3.2 DNS, DHCP, NAT, and MAC

Β 

3.3 Packet Structure and Encapsulation

Β 

3.4 Public vs Private Networks

Β 

3.5 Common Protocols: HTTP, HTTPS, FTP, Telnet, SSH