
Hacking Webinar
March 3, 2022 - April 23, 2022
Hello I'm Kunj Joshi, Cybersecurity Mentor at Programming with Maurya. I was interested in Cybersecurity since the beginning, in exploiting vulnerabilities and more in patching them. This webinar had been a source of propagating the knowledge I had to other students and making them realise the need of cyber safety in today's world. I learned various different kinds of attacks and how to patch them up, learnt about different meritable certifications in Cybersecurity and how to prepare for them and most importantly, I learnt more about the nature of security from the Students. It was a fun and enriching experience which I suggest everyone should enroll for. Thank You
Information Security
Introduction to Cyber Security
Malware and its types
Helpful Security Material
Kali Linux and Introduction
Metasploitable
Cyber Security Preventive and Mitigative Methods
Python For Cyber Security
-
Cyber Security and Information Security
-
Why Information Security? CIA Triad
-
Situational Examples on need of Information Security
-
Encryption and Decryption
-
Roots: Caesar Cipher
-
Stream vs Block Cipher
-
Permutation vs Substitution Cipher
-
Vigenere Cipher
-
Hill Cipher
-
Rail Fence Cipher
-
Transposition Cipher
-
6x6 Playfair Cipher
-
Modern Block Based Ciphers: Fiestel Structure
-
Number Theory
-
DES
-
Limitations in DES
-
AES
-
RSA
-
Hashing and its uses
-
Commonly used Hashing Algorithms: MD5 and SHA256
-
MD5 and its working
-
SHA256 and its working
-
Message Aunthentication Code
-
HMAC
-
Attacks on Data
-
What is Cyber Security?
-
The Need of Cyber Security and its Situational Examples
-
Cyber Security vs Information Security
-
Cyber Crimes and their Classification
-
Cybersecurity Terminology
-
Cyber Warfare
-
Challenges in Cyber Security
-
Types of Hackers
-
Types of Malwares
-
Cyber laws in India
-
Vulnerabilities and Its Types
-
Authorisation and Authentication
-
Preventive Methods
-
How to learn Cybersecurity
-
Practical Cybersecurity
-
Scopes in Cyber Security: Jobs available
-
Certifications
-
Web Application Hacking
-
Airport Hacking
-
Steps in Cyber Security/ Penetration Testing
-
Malwares and its Types
-
Different Types of Attacks
-
SQL Injection
-
OS Command Injection
-
Keylogger
-
Viruses and Their Implications
-
Worms and Their Implications
-
Trojan Horses and Their Implications
-
Brute Force Method
-
Zero Day Attacks
-
Dos and Ddos
-
Man In The Middle Attack
-
Social Engineering
-
Phishing and Spear Phishing
-
Cross Site Scripting (XSS)
-
Ransomware
-
Adware
-
Bloatware
-
Spyware
-
Session Hijacking
-
OWASP Top 10
-
Dictionary Attack
-
Backdoors and Trapdoors
-
Buffer Overflow
-
Hardware Based: Directory Traversal, Rowhammer and Meltdown
-
Google Dorks or GHDB
-
Shodan: The Hacker's Search Engine
-
Kali Linux
-
Metasploitable Machine
-
Google Based Hacking
-
Steganography, Dark Web and Blockchain
-
Websites which are useful or hackers
-
Installing Kali Linux iso and Virtual Box
-
Basics of Linux
-
Reconaissance: nmap
-
Burpsuite
-
OWASP ZAP Tool
-
First attack with help of Hackthebox.com
-
Phishing using Kali Linux
-
WPScan
-
John The Ripper
-
Hydra
-
Weevely
-
Ettercap
-
Advanced Tools: Aircrack-ng and msfvenom
-
What is Metasploitable Machine?
-
Metasploitable Basics,Exploits and Payloads
-
Rapid7 Website
-
Understanding Modules
-
Information Gathering: Auxillary Modules
-
Basic Exploitation
-
First attack on Metasploit Machine by creating FTP Backdoor
-
Virtual Private Networks
-
Basic Workplace Security Measures
-
Firewall
-
Code Obfuscation
-
Regex
-
Code Scrutiny
-
Secure Connections and Broadband
-
Preventing DoS and DDoS
-
Antivirus Softwares
-
Affects of Infection
-
How to secure data once infected? Mitigation
-
Different Encryption, Decryption and Hashing Algorithms
-
Keylogger in Python
-
Web Scraping/ Web Crawling Using Python
-
Brute Force Creator
-
Network Scanner using Python
-
Automated Mailing in Python
Time : 6 PM to 8 PM IST
Venue: Zoom
Duration: 2 Months
Every Saturday and Sunday
Will start on from: March 5, 2022
Last Date for Registration: March 2, 2022
Registration Fee: 490/- INR
For international payments please mail us at programmingwithmaurya@gmail.com for registration.
Get Assignments and notes.
And get a verified certificate after completion of the webinar.
You can also mail us for recorded lectures.
We may conduct competition on hacking.*
First position :- 5000/- INR
and top 5 performers will get 1500/- INR each.
*Depending upon the numbers of participated students.
Certification
-
Upgrade your Resume
-
Performance-Based Recognition
-
Achieve Domain Excellence
