Understanding the hacker’s Lingo:
Networking:
Computer Security Basics:
Basic Security Concept:
Password cracking:
Now you have gone through the Networking Basics now test it Testing your networking skills
https://www.proprofs.com/quiz-school/story.php?title=technical-skills-test
OWASP Top Ten 2017:
https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf
SQL Injection attack and its prevention:
https://medium.com/bugbountywriteup/how-to-write-secure-code-against-injection-attacks-aad4fff058da
XSS attack and prevention:
https://medium.com/@charithra/introduction-to-xss-e9eb90b4323d
XSRF attack
Network Security:
Linux Command
Port Scanning With Nmap:
https://nmap.org/book/port-scanning-tutorial.html https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/
Packet Sniffing with Wireshark
Metasploit:
SQL
Html
JavaScript
Now you have gone through the Programming Fundamental now test it
Testing your Scripting Skills
https://github.com/OWASP/CheatcomeSheetSeries/tree/master/cheatsheets
https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
https://portswigger.net/web-security/sql-injection/cheat-sheet
https://files.fosswire.com/2007/08/fwunixref.pdf
https://www.loggly.com/wp-content/uploads/2015/05/Linux-Cheat-Sheet-Sponsored-By-Loggly.pdf
https://blogs.sans.org/pen-testing/files/2013/10/NmapCheatSheetv1.1.pdf
Books: - In this section, we have provided you with a list of books that would be extremely helpful when you start the course.
Gray Hat Hacking: The Ethical Hacker's Handbook
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
OWASP Testing Guide v4
Hacking, 2nd Edition: The Art of Exploitation
HACKING EXPOSED: NETWORK SECURITY SECRETS AND SOLUTIONS, THIRD EDITION
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Art of Deception: Controlling the Human Element of Security
Cracking Codes with Python
https://null-byte.wonderhowto.com/
https://www.hackerone.com/blog
https://www.youtube.com/user/JackkTutorials
These tools will come in handy while going through the
Ettercap: - https://www.thegeekstuff.com/2012/05/ettercap-tutorial/
SQL Map: - https://hackertarget.com/sqlmap-tutorial/
Burp suite: -https://jonathansblog.co.uk/burpsuite-beginners-tutorial
John the Ripper: - https://www.openwall.com/john/doc/EXAMPLES.shtml
LOIC: https://github.com/NewEraCracker/LOIC-
Gathering Information
https://hackernoon.com/https-medium-com-aamralkar-footprinting-and-reconnaissance-e14010b22a89