Useful Links
Computer Science
Cybersecurity
Ethical Hacking
1. Foundations of Ethical Hacking
2. Networking Fundamentals for Hackers
3. The Ethical Hacking Methodology
4. Web Application Security Testing
5. Wireless Network Security
6. Social Engineering
7. Mobile Device Security
8. Cryptography and Cryptanalysis
9. Advanced Evasion and Anti-Forensics
10. Cloud Security and IoT Hacking
Networking Fundamentals for Hackers
OSI Reference Model
Physical Layer
Transmission Media
Copper Cables
Fiber Optic Cables
Wireless Transmission
Physical Topologies
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Signal Encoding
Digital Encoding
Analog Encoding
Modulation Techniques
Data Link Layer
MAC Addressing
Address Structure
Address Assignment
Address Resolution
Ethernet Standards
Frame Structure
CSMA/CD Protocol
Switching Concepts
Wireless Data Link
802.11 Frame Structure
Wireless Access Methods
Network Layer
IP Addressing
IPv4 Addressing
IPv6 Addressing
Address Classes
Private Address Ranges
Routing Protocols
Static Routing
Dynamic Routing
Interior Gateway Protocols
Exterior Gateway Protocols
Subnetting and VLSMs
Subnet Mask Calculation
Variable Length Subnet Masks
Supernetting
Transport Layer
TCP Protocol
Connection Establishment
Reliable Data Transfer
Flow Control
Congestion Control
UDP Protocol
Connectionless Communication
UDP Header Structure
Use Cases and Applications
Port Numbers
Well-Known Ports
Registered Ports
Dynamic Ports
Session Layer
Session Management
Session Establishment
Session Maintenance
Session Termination
Session Protocols
NetBIOS
RPC
SQL Sessions
Presentation Layer
Data Representation
Character Encoding
Data Compression
Data Encryption
Protocol Translation
Format Conversion
Syntax Translation
Application Layer
Application Protocols
HTTP and HTTPS
FTP and SFTP
SMTP and POP3
DNS
DHCP
SNMP
Application Services
Directory Services
File Services
Print Services
TCP/IP Protocol Suite
Network Access Layer
Ethernet Protocol
Frame Format
MAC Addressing
Collision Detection
Wireless Protocols
802.11 Standards
Wireless Security
Point-to-Point Protocol
PPP Frame Structure
Authentication Methods
Internet Layer
Internet Protocol
IPv4 Protocol
IPv6 Protocol
IP Header Analysis
Internet Control Message Protocol
ICMP Message Types
Ping and Traceroute
Error Reporting
Address Resolution Protocol
ARP Operation
ARP Cache
ARP Spoofing
Transport Layer
Transmission Control Protocol
TCP Header Structure
Three-Way Handshake
Connection Termination
TCP State Machine
User Datagram Protocol
UDP Header Structure
UDP Applications
UDP vs TCP Comparison
Application Layer
Hypertext Transfer Protocol
HTTP Methods
Status Codes
Headers and Cookies
Secure HTTP
TLS/SSL Encryption
Certificate Validation
HTTPS Implementation
Domain Name System
DNS Hierarchy
DNS Record Types
DNS Resolution Process
File Transfer Protocol
FTP Commands
Active vs Passive Mode
Secure FTP Variants
Network Architecture Components
Switching Infrastructure
Layer 2 Switches
MAC Address Learning
VLAN Implementation
Spanning Tree Protocol
Layer 3 Switches
Inter-VLAN Routing
Routing Table Management
Switch Security Features
Port Security
DHCP Snooping
Dynamic ARP Inspection
Routing Infrastructure
Router Functions
Packet Forwarding
Path Determination
Network Address Translation
Routing Protocols
RIP
OSPF
EIGRP
BGP
Router Security
Access Control Lists
Route Filtering
Authentication
Security Appliances
Firewalls
Packet Filtering Firewalls
Stateful Inspection Firewalls
Next-Generation Firewalls
Firewall Rules and Policies
Intrusion Detection Systems
Network-Based IDS
Host-Based IDS
Signature-Based Detection
Anomaly-Based Detection
Intrusion Prevention Systems
Inline Deployment
Prevention Techniques
Response Actions
Unified Threat Management
Integrated Security Features
Centralized Management
Remote Access Technologies
Virtual Private Networks
Site-to-Site VPNs
Remote Access VPNs
VPN Protocols
VPN Security
Proxy Servers
Forward Proxies
Reverse Proxies
Transparent Proxies
Proxy Authentication
IP Addressing and Subnetting
IPv4 Addressing
Address Structure
Network and Host Portions
Dotted Decimal Notation
Binary Representation
Address Classes
Class A Networks
Class B Networks
Class C Networks
Class D and E Networks
Special Address Ranges
Private Address Ranges
Loopback Addresses
Link-Local Addresses
Multicast Addresses
IPv6 Addressing
Address Structure
Hexadecimal Notation
Address Compression
Prefix Notation
Address Types
Unicast Addresses
Multicast Addresses
Anycast Addresses
IPv6 Transition Mechanisms
Dual Stack
Tunneling
Translation
Subnetting Concepts
Subnet Masks
Default Subnet Masks
Custom Subnet Masks
CIDR Notation
Subnetting Calculations
Number of Subnets
Number of Hosts
Subnet Ranges
Variable Length Subnet Masking
VLSM Benefits
VLSM Design
Route Summarization
Previous
1. Foundations of Ethical Hacking
Go to top
Next
3. The Ethical Hacking Methodology