Ethical Hacking
Part 1: Ethical Hacking Overview
Part 2: Web security hands-on/Practicals
- Discovering the infrastructure of web application
- SQL Injection
- XSS and Java Script
- CSRF
- Buffer Overflow Attack
- Exercise on Realtime Vulnerable application
Part 3: Social engineering hands-on/Practicals
- Phishing
- Spear Phishing
- Tailgating
- Malware
- Ransomware
- Vishing
- Water Holing
Part 4: Steganography hands-on/Practicals
- What is Steganography?
- Hiding data behind Images, PDFs, Audio and Videos files
Part 5: Cyber security career path and Intro to Bug bounty
Part 6: Q&A session for half an Hour