INTRODUCTION - CYBERSECURITY (Duration: 8 HOURS)
- What is cybersecurity and why is it important
- The life cycle of a cyber attack
- Introduction to Ethical Hacking
- The concept of Penetration Testing
- Cybersecurity laws and regulations (GDPR, Privacy)
Topic 1 - Reconnaissance (Duration: 10 hours)
- What is reconnaissance and its importance
- Types of reconnaissance: active and passive
- Passive reconnaissance tools
- WHOIS, DNS, social media, and other public sources
- Active reconnaissance tools
- Nmap, Netcat, traceroute, and network analysis
- Information gathering techniques
- Identifying the network infrastructure
- Discovering IP addresses and determining vulnerabilities
- Analysis of collected data
- Interpreting information to determine the entry point
Topic 2 - System Scanning (Duration: 7 hours)
- What is scanning and its application in penetration testing
- Scanning ports and services
- Using tools such as Nmap to scan ports
- Service version scanning and detection of vulnerable services
- Vulnerability scanning
- Vulnerability scanning with tools such as OpenVAS and Nessus
- Identification of operating systems (OS Fingerprinting)
- OS identification techniques through Nmap
- Evasion techniques to avoid detection during scanning
Topic 3 - Gaining Access to Systems (Duration: 12 hours)
- What is Gaining Access and how a vulnerability is exploited
- Exploit techniques
- Exploits of known vulnerabilities in systems
- Using Metasploit Framework
- Password attacks
- Brute force, dictionary and hybrid attacks
- Using tools such as Hydra, John the Ripper, or Hashcat
- Execution of malware to compromise a system
- Backdoors and rootkits
- Privilege escalation techniques
- Exploit local vulnerabilities to obtain elevated privileges (root, admin)
Topic 4 - Maintaining Access (Duration: 10 hours)
- What is access maintenance and its importance
- Backdoors and rootkits
- Creating backdoors for persistent access
- Using rootkits to evade detection
- Remote control techniques
- Use of tools such as Netcat, Reverse Shell, or Cobalt Strike
- Creating a secure communication channel
- Communication encryption to avoid detection
- Log cleaning techniques
- How to avoid hacking activities being tracked
Topic 5 - Clearing Tracks (Duration: 10 hours)
Trace deletion techniques
- Log cleaning:
- Evasion of monitoring technologies:
- Tunneling techniques“
- Use of Rootkits
- Methods of erasing data on hard disks
- Alteration of timestamps
- Evasion of firewalls and intrusion detection systems
- Windows: Specific techniques for removing traces on a Windows system (cleaning event logs, removing PowerShell command history, removing traces in system logs)
- Linux/Unix: Commands such as history -c, changes in system logs and temporary files (/tmp, /var/log)
- MacOS: Deleting navigation tracks and system logs in the Apple environment
- Database: Deleting Query Logs and Access Traces