Ethical Hacking

  1. Networking Fundamentals for Hackers
    1. OSI Reference Model
      1. Physical Layer
        1. Transmission Media
          1. Copper Cables
            1. Fiber Optic Cables
              1. Wireless Transmission
              2. Physical Topologies
                1. Bus Topology
                  1. Star Topology
                    1. Ring Topology
                      1. Mesh Topology
                      2. Signal Encoding
                        1. Digital Encoding
                          1. Analog Encoding
                            1. Modulation Techniques
                          2. Network Layer
                            1. IP Addressing
                              1. IPv4 Addressing
                                1. IPv6 Addressing
                                  1. Address Classes
                                    1. Private Address Ranges
                                    2. Routing Protocols
                                      1. Static Routing
                                        1. Dynamic Routing
                                          1. Interior Gateway Protocols
                                            1. Exterior Gateway Protocols
                                            2. Subnetting and VLSMs
                                              1. Subnet Mask Calculation
                                                1. Variable Length Subnet Masks
                                                  1. Supernetting
                                                2. Transport Layer
                                                  1. TCP Protocol
                                                    1. Connection Establishment
                                                      1. Reliable Data Transfer
                                                        1. Flow Control
                                                          1. Congestion Control
                                                          2. UDP Protocol
                                                            1. Connectionless Communication
                                                              1. UDP Header Structure
                                                                1. Use Cases and Applications
                                                                2. Port Numbers
                                                                  1. Well-Known Ports
                                                                    1. Registered Ports
                                                                      1. Dynamic Ports
                                                                    2. Session Layer
                                                                      1. Session Management
                                                                        1. Session Establishment
                                                                          1. Session Maintenance
                                                                            1. Session Termination
                                                                            2. Session Protocols
                                                                              1. NetBIOS
                                                                                1. RPC
                                                                                  1. SQL Sessions
                                                                                2. Presentation Layer
                                                                                  1. Data Representation
                                                                                    1. Character Encoding
                                                                                      1. Data Compression
                                                                                        1. Data Encryption
                                                                                        2. Protocol Translation
                                                                                          1. Format Conversion
                                                                                            1. Syntax Translation
                                                                                          2. Application Layer
                                                                                            1. Application Protocols
                                                                                              1. HTTP and HTTPS
                                                                                                1. FTP and SFTP
                                                                                                  1. SMTP and POP3
                                                                                                    1. DNS
                                                                                                      1. DHCP
                                                                                                        1. SNMP
                                                                                                        2. Application Services
                                                                                                          1. Directory Services
                                                                                                            1. File Services
                                                                                                        3. TCP/IP Protocol Suite
                                                                                                          1. Network Access Layer
                                                                                                            1. Ethernet Protocol
                                                                                                              1. Frame Format
                                                                                                                1. MAC Addressing
                                                                                                                  1. Collision Detection
                                                                                                                  2. Wireless Protocols
                                                                                                                    1. 802.11 Standards
                                                                                                                      1. Wireless Security
                                                                                                                      2. Point-to-Point Protocol
                                                                                                                        1. PPP Frame Structure
                                                                                                                          1. Authentication Methods
                                                                                                                        2. Internet Layer
                                                                                                                          1. Internet Protocol
                                                                                                                            1. IPv4 Protocol
                                                                                                                              1. IPv6 Protocol
                                                                                                                                1. IP Header Analysis
                                                                                                                                2. Internet Control Message Protocol
                                                                                                                                  1. ICMP Message Types
                                                                                                                                    1. Ping and Traceroute
                                                                                                                                      1. Error Reporting
                                                                                                                                      2. Address Resolution Protocol
                                                                                                                                        1. ARP Operation
                                                                                                                                          1. ARP Cache
                                                                                                                                            1. ARP Spoofing
                                                                                                                                          2. Transport Layer
                                                                                                                                            1. Transmission Control Protocol
                                                                                                                                              1. TCP Header Structure
                                                                                                                                                1. Three-Way Handshake
                                                                                                                                                  1. Connection Termination
                                                                                                                                                    1. TCP State Machine
                                                                                                                                                    2. User Datagram Protocol
                                                                                                                                                      1. UDP Header Structure
                                                                                                                                                        1. UDP Applications
                                                                                                                                                          1. UDP vs TCP Comparison
                                                                                                                                                        2. Application Layer
                                                                                                                                                          1. Hypertext Transfer Protocol
                                                                                                                                                            1. HTTP Methods
                                                                                                                                                              1. Status Codes
                                                                                                                                                                1. Headers and Cookies
                                                                                                                                                                2. Secure HTTP
                                                                                                                                                                  1. TLS/SSL Encryption
                                                                                                                                                                    1. Certificate Validation
                                                                                                                                                                      1. HTTPS Implementation
                                                                                                                                                                      2. Domain Name System
                                                                                                                                                                        1. DNS Hierarchy
                                                                                                                                                                          1. DNS Record Types
                                                                                                                                                                            1. DNS Resolution Process
                                                                                                                                                                            2. File Transfer Protocol
                                                                                                                                                                              1. FTP Commands
                                                                                                                                                                                1. Active vs Passive Mode
                                                                                                                                                                                  1. Secure FTP Variants
                                                                                                                                                                              2. Network Architecture Components
                                                                                                                                                                                1. Switching Infrastructure
                                                                                                                                                                                  1. Layer 2 Switches
                                                                                                                                                                                    1. MAC Address Learning
                                                                                                                                                                                      1. VLAN Implementation
                                                                                                                                                                                        1. Spanning Tree Protocol
                                                                                                                                                                                        2. Layer 3 Switches
                                                                                                                                                                                          1. Inter-VLAN Routing
                                                                                                                                                                                            1. Routing Table Management
                                                                                                                                                                                            2. Switch Security Features
                                                                                                                                                                                              1. Port Security
                                                                                                                                                                                                1. DHCP Snooping
                                                                                                                                                                                                  1. Dynamic ARP Inspection
                                                                                                                                                                                                2. Routing Infrastructure
                                                                                                                                                                                                  1. Router Functions
                                                                                                                                                                                                    1. Packet Forwarding
                                                                                                                                                                                                      1. Path Determination
                                                                                                                                                                                                        1. Network Address Translation
                                                                                                                                                                                                        2. Routing Protocols
                                                                                                                                                                                                          1. RIP
                                                                                                                                                                                                            1. OSPF
                                                                                                                                                                                                              1. EIGRP
                                                                                                                                                                                                                1. BGP
                                                                                                                                                                                                                2. Router Security
                                                                                                                                                                                                                  1. Access Control Lists
                                                                                                                                                                                                                    1. Route Filtering
                                                                                                                                                                                                                      1. Authentication
                                                                                                                                                                                                                    2. Security Appliances
                                                                                                                                                                                                                      1. Firewalls
                                                                                                                                                                                                                        1. Packet Filtering Firewalls
                                                                                                                                                                                                                          1. Stateful Inspection Firewalls
                                                                                                                                                                                                                            1. Next-Generation Firewalls
                                                                                                                                                                                                                              1. Firewall Rules and Policies
                                                                                                                                                                                                                              2. Intrusion Detection Systems
                                                                                                                                                                                                                                1. Network-Based IDS
                                                                                                                                                                                                                                  1. Host-Based IDS
                                                                                                                                                                                                                                    1. Signature-Based Detection
                                                                                                                                                                                                                                      1. Anomaly-Based Detection
                                                                                                                                                                                                                                      2. Intrusion Prevention Systems
                                                                                                                                                                                                                                        1. Inline Deployment
                                                                                                                                                                                                                                          1. Prevention Techniques
                                                                                                                                                                                                                                            1. Response Actions
                                                                                                                                                                                                                                            2. Unified Threat Management
                                                                                                                                                                                                                                              1. Integrated Security Features
                                                                                                                                                                                                                                                1. Centralized Management
                                                                                                                                                                                                                                              2. Remote Access Technologies
                                                                                                                                                                                                                                                1. Virtual Private Networks
                                                                                                                                                                                                                                                  1. Site-to-Site VPNs
                                                                                                                                                                                                                                                    1. Remote Access VPNs
                                                                                                                                                                                                                                                      1. VPN Protocols
                                                                                                                                                                                                                                                        1. VPN Security
                                                                                                                                                                                                                                                        2. Proxy Servers
                                                                                                                                                                                                                                                          1. Forward Proxies
                                                                                                                                                                                                                                                            1. Reverse Proxies
                                                                                                                                                                                                                                                              1. Transparent Proxies
                                                                                                                                                                                                                                                                1. Proxy Authentication
                                                                                                                                                                                                                                                            2. IP Addressing and Subnetting
                                                                                                                                                                                                                                                              1. IPv4 Addressing
                                                                                                                                                                                                                                                                1. Address Structure
                                                                                                                                                                                                                                                                  1. Network and Host Portions
                                                                                                                                                                                                                                                                    1. Dotted Decimal Notation
                                                                                                                                                                                                                                                                      1. Binary Representation
                                                                                                                                                                                                                                                                      2. Address Classes
                                                                                                                                                                                                                                                                        1. Class A Networks
                                                                                                                                                                                                                                                                          1. Class B Networks
                                                                                                                                                                                                                                                                            1. Class C Networks
                                                                                                                                                                                                                                                                              1. Class D and E Networks
                                                                                                                                                                                                                                                                              2. Special Address Ranges
                                                                                                                                                                                                                                                                                1. Private Address Ranges
                                                                                                                                                                                                                                                                                  1. Loopback Addresses
                                                                                                                                                                                                                                                                                    1. Multicast Addresses
                                                                                                                                                                                                                                                                                  2. IPv6 Addressing
                                                                                                                                                                                                                                                                                    1. Address Structure
                                                                                                                                                                                                                                                                                      1. Hexadecimal Notation
                                                                                                                                                                                                                                                                                        1. Address Compression
                                                                                                                                                                                                                                                                                          1. Prefix Notation
                                                                                                                                                                                                                                                                                          2. Address Types
                                                                                                                                                                                                                                                                                            1. Unicast Addresses
                                                                                                                                                                                                                                                                                              1. Multicast Addresses
                                                                                                                                                                                                                                                                                                1. Anycast Addresses
                                                                                                                                                                                                                                                                                                2. IPv6 Transition Mechanisms
                                                                                                                                                                                                                                                                                                  1. Dual Stack
                                                                                                                                                                                                                                                                                                    1. Tunneling
                                                                                                                                                                                                                                                                                                      1. Translation
                                                                                                                                                                                                                                                                                                    2. Subnetting Concepts
                                                                                                                                                                                                                                                                                                      1. Subnet Masks
                                                                                                                                                                                                                                                                                                        1. Default Subnet Masks
                                                                                                                                                                                                                                                                                                          1. Custom Subnet Masks
                                                                                                                                                                                                                                                                                                            1. CIDR Notation
                                                                                                                                                                                                                                                                                                            2. Subnetting Calculations
                                                                                                                                                                                                                                                                                                              1. Number of Subnets
                                                                                                                                                                                                                                                                                                                1. Number of Hosts
                                                                                                                                                                                                                                                                                                                  1. Subnet Ranges
                                                                                                                                                                                                                                                                                                                  2. Variable Length Subnet Masking
                                                                                                                                                                                                                                                                                                                    1. VLSM Benefits
                                                                                                                                                                                                                                                                                                                      1. VLSM Design
                                                                                                                                                                                                                                                                                                                        1. Route Summarization