need students

This project is now closed with a project budget of N/A.

Get free quotes for a project like this
Project Budget
Project Description

Need students for my ethical hacking course contact me [The Administrator removed this message for containing contact details which breaches our Terms and Conditions.]

Chapter 1-Introduction To Hacking

-What is a Hacker

-Hacker Types

-Types of Attacks

-What is an Exploit

-Identifying Vulnerabilities



-Session Hijacking



-What a Hacker should know

Chapter 2-Email Hacking

-Phishing Attacks




-Sniffing Passwords

-Password Guessing

-Brute Force

-Password Recovering

-Email Bombing Attack

-Email Spoofing Attack

-Social Engineering Attacks

Chapter 3-Facebook Hacking



-Deleting facebook accounts

-Facebook message spoofer

-Deleting images

-Securing Accounts

Chapter 4-Website Hacking

-Website Hacking Methods

-How to find a vulerability on a Website

-SQL Injection

-Tools for Website Hacking

-Port Scanning

-Information Gathering

Chapter 5-Denial Of Service

-What is Denial Of Service

-How to Perform Denial of Service Attack

-How to prevent your Website from Denial Of Service Attacks

-How to Crash a Server

Chapter 6-Virus

-What is a Virus

-Virus Types

-How to create a virus

-How to make a virus undetectable

-How to spread a virus on the Internet

-How to protect your Computer from viruses

Chapter 7-Wireless Network Hacking

-Wireless Network Types

-Identifying Wireless Networks

-Cracking WPA Wireless Network Password

-Cracking WEP Wireless Network Password

-Cracking WPA2 Wireless Network Password

-How to Protect your Wireless Network

Chapter 8-Hiding Identity

-What is an IP Address

-How to surf anonymously on internet

-What is a proxy

-How to hide and change your IP Address

-What is a Mac Adress and how to change it

-How to find somebody IP Address and trace it

-How to remove your tracks

Chapter 9-Operation System Hacking

-Introduction to Windows

-How to Crack Windows Passwords

-Windows Vulnerabilities

-System Hacking

-Windows Tips and Tricks

-How to recover deleted files

-Mac Address Spoofing

-Increasing your System's Performance


-Introduction about Linux

-Buffer overflow Attack

-Securing your System

Chapter 10-Networking

-Introduction to Network


-Hacking Security Cameras

-Network Passwords Sniffing

-What is Switch

-What is Hub

-Network Ports

Chapter 11-Exploits

-What is an Exploit

-Exploit Types

-How to set an Exploit

-Proxy pivoting

-VPN pivoting

-Unauthorized Data Acess

-Information Leakage

Chapter 12-Backtrack

-Introduction to Backtrack

-How to install Backtrack

-How to set Metasploit using Backtrack

-Website Information gathering

-Email Collector


-DNS Spoofing

-Metasploit Backdoor

-Hacking into Remote Computer

Chapter 13-Cracking

-Introduction to Cracking

-What is a Cracker

-Cracking Software

-Cracking Hashes

-Cracking Passwords




Looking to make some money?

  • Set your budget and the timeframe
  • Outline your proposal
  • Get paid for your work

Hire Freelancers who also bid on this project

    • Forbes
    • The New York Times
    • Time
    • Wall Street Journal
    • Times Online