need students

This project is now closed with a project budget of N/A.

Get free quotes for a project like this
Employer working
Project Budget
Project Description

Need students for my ethical hacking course contact me [The Administrator removed this message for containing contact details which breaches our Terms and Conditions.]

Chapter 1-Introduction To Hacking
-What is a Hacker
-Hacker Types
-Types of Attacks
-What is an Exploit
-Identifying Vulnerabilities
-Session Hijacking
-What a Hacker should know

Chapter 2-Email Hacking
-Phishing Attacks
-Sniffing Passwords
-Password Guessing
-Brute Force
-Password Recovering
-Email Bombing Attack
-Email Spoofing Attack
-Social Engineering Attacks

Chapter 3-Facebook Hacking

-Deleting facebook accounts
-Facebook message spoofer
-Deleting images
-Securing Accounts

Chapter 4-Website Hacking
-Website Hacking Methods
-How to find a vulerability on a Website
-SQL Injection
-Tools for Website Hacking
-Port Scanning
-Information Gathering

Chapter 5-Denial Of Service
-What is Denial Of Service
-How to Perform Denial of Service Attack
-How to prevent your Website from Denial Of Service Attacks
-How to Crash a Server

Chapter 6-Virus
-What is a Virus
-Virus Types
-How to create a virus
-How to make a virus undetectable
-How to spread a virus on the Internet
-How to protect your Computer from viruses

Chapter 7-Wireless Network Hacking
-Wireless Network Types
-Identifying Wireless Networks
-Cracking WPA Wireless Network Password
-Cracking WEP Wireless Network Password
-Cracking WPA2 Wireless Network Password
-How to Protect your Wireless Network

Chapter 8-Hiding Identity
-What is an IP Address
-How to surf anonymously on internet
-What is a proxy
-How to hide and change your IP Address
-What is a Mac Adress and how to change it
-How to find somebody IP Address and trace it
-How to remove your tracks

Chapter 9-Operation System Hacking
-Introduction to Windows
-How to Crack Windows Passwords
-Windows Vulnerabilities
-System Hacking
-Windows Tips and Tricks
-How to recover deleted files
-Mac Address Spoofing
-Increasing your System's Performance
-Introduction about Linux
-Buffer overflow Attack
-Securing your System

Chapter 10-Networking
-Introduction to Network
-Hacking Security Cameras
-Network Passwords Sniffing
-What is Switch
-What is Hub
-Network Ports

Chapter 11-Exploits
-What is an Exploit
-Exploit Types
-How to set an Exploit
-Proxy pivoting
-VPN pivoting
-Unauthorized Data Acess
-Information Leakage

Chapter 12-Backtrack
-Introduction to Backtrack
-How to install Backtrack
-How to set Metasploit using Backtrack
-Website Information gathering
-Email Collector
-DNS Spoofing
-Metasploit Backdoor
-Hacking into Remote Computer

Chapter 13-Cracking
-Introduction to Cracking
-What is a Cracker
-Cracking Software
-Cracking Hashes
-Cracking Passwords


Looking to make some money?

  • Set your budget and the timeframe
  • Outline your proposal
  • Get paid for your work

Hire Freelancers who also bid on this project

    • Forbes
    • The New York Times
    • Time
    • Wall Street Journal
    • Times Online