Black Hat Hacking Curriculum

hacker computer school

cropped-hackerschoolstudents.jpeg
Learning Part-1

Chapter 1 – Securing Operating Systems
Chapter 2 – Protecting Systems Using Antiviruses
Chapter 3 Footprinting/Reconnaissance
Chapter 4: Data Encryption
Chapter 5: Data Backup and Disaster Recovery
Chapter 6: Internet Security
Chapter 7: Securing Network Connections
Chapter 8: Securing Online Transactions
Chapter 9: Securing Email Communications
Chapter 10:Social Engineering and Identity Theft
Chapter 11:Security on Social Networking Sites
Chapter 12:Information Security and Legal Compliance
Chapter 13: Securing Mobile Devices
Chapter 14: Windows Hacking Command & Batch Programs
Chapter 15: Basic HTML Programs

Learning Part-2

Chapter 1 – Introduction
Chapter 2 – Networking
Chapter 3 Footprinting/Reconnaissance
Chapter 4: Advance Google Hacking
Chapter 5: Scanning
Chapter 6: Windows Hacking
Chapter 7: Password Hacking
Chapter 8: Malwares
Chapter 9: SQL Injection
Chapter 10: Cross Site Scripting
Chapter 11: Social Engineering
Chapter 12: Denial of Service
Chapter 13: Cryptography & Steganography
Chapter 14: Firewalls & Honeypots
Chapter 15: Email Secure From Hacking
Chapter 16:Firewalls & Honeypots
Chapter 17: Reverse Engineering
Chapter 18: Physical Security
Chapter 19: Arch & Kali Linux Install
Chapter 20: Android Os Install
Chapter 21: Create Android App For Password Hacking
Chapter 22: Windows Command And Batch Program For Hacking
Chapter 23: GHOST
Chapter 24: Create Payload For –
Android, Iphone, Mac, Window, Linux and Server
Chapter 25: Bypass Antivirus Security
Chapter 26: Wifi Hacking – Discnary & brute force Attack
Chapter 27:Fluxion
Chapter 28: Bettercap

Learning Part-3
Chapter 29 – Generate password list
Chapter 30 – Hack router password
Chapter 31 – Polycom HDX
Chapter 32 – Hollywood Style Xp Hack
Chapter 33 – Hollywood Style Crash 7
Chapter 34 – Hollywood Style Server 2003 hack
Chapter 35 – Hollywood Style server 2008 Hack
Chapter 36 – Penetration Testing: What You Should Know
Chapter 37 – Getting Comfortable with Kali Linux
Chapter 38 – The Essential Tools
Chapter 39 – Passive Information Gathering
Chapter 40 – Active Information Gathering
Chapter 41- Vulnerability Scanning
Chapter 42 – Buffer Overflows
Chapter 43 – Win32 Buffer Overflow Exploitation
Chapter 44 – Linux Buffer Overflow Exploitation
Chapter 45 – Working with Exploits
Chapter 46 – File Transfers
Chapter 47 – Privilege Escalatio
Chapter 48 – Client Side Attacks
Chapter 49 – Web Application Attacks
Chapter 50 – Password Attacks
Chapter 51 – Port Redirection and Tunneling
Chapter 52 – The Metasploit Framework
Chapter 53 – Bypassing Antivirus Software
Chapter 54 – Computer Hacking Forensics Investigation

And More…………………………………………………………………..

cropped-unnamed-1.jpg

Hacker Computer School

Address: F-612 ground floor Ramphal chowk Dwarka sector-7, New Delhi, 110045 , Phone:  (+91) 7988285508    WhatsApp – +91-9017313635

Head Office:- Address Ward No-22 , Near Ply Factory , Balraj Nagar Street No-8
City – Kaithal-136027  State-Haryana (India) Con. No. +91-9017313635 +91-7988285508
E-Mail-Hackercomputerschool@gmail.com

Advertisements