We need an information security teacher for our online Computer Science tutorial website. Your lessons should be broadcasted in our website for the students. The curriculum is provided below. Let us know your relevant Skills and experiences.
Footprinting and Information Gathering:
From Social Media
Web server Whois
Reserved IP Location
Which platform used for developing
Ping to identify server details
Collecting Information from Email Header
Email Tracking Tools
Tracking of a target person
Website Cookies history
Recover any deleted files. [ PC or Mobile ]
PHP & MySQL Basic:
Website Penetration Testing:
What is website Penetration Testing
Website Penetration Testing Tools
Discussion of the different types of vulnerabilities
Defining a web application test scope and process
Defining types of penetration testing
Tools and manual process of penetration testing
Some more ++
Web Attacking method
Private exploit of Arena Web Security
Target Server Exploit
Private shell script
Compromising Session IDs using Sniffing
Compromising Session IDs by Predicting Session Token
All Possible Passwords Cracking Method
Password Cracking Tools and Script
How to Defend Against Keyloggers
How to make keylogger Spyware?
How to Bind keylogger file in Real setup File?
Paid course on keylogger project [free]
Malware Threats [Virus]
What is a Trojan?
File Extension Viruses
Pen Testing for Trojans and Backdoors
Penetration Testing for Virus
Web Server security, Cpanel
CSRF and XSS
Social Media account recovery process.
Facebook account Hacking ways and Security.
What is a Denial of Service Attack?
What Are Distributed Denial of Service Attacks?
How Distributed Denial of Service Attacks Work
Live DDOS attack
SQL Injection All method
Blind SQL Injection
POST base SQL Injection
Evading IDS, Firewalls, and Honeypots
Scanning Networks web server:
Proxy Tools for Mobile
Free Proxy Servers
Scanning Pen Testing
Linux - Kali Linux
VM ware setting
Kali Linux Tools
Paid course about Bug Bounty project [ free ]
Login Page injection
Cross Site Scripting
Cross-Site Request Forgery (CSRF)
Outsourcing in Fiverr / Upwork:
What is Fiverr & Upwork?
What type of work would suit you?
How create a GIG and Sell it?
Fiverr freelancing support.
Order and Payment
Dollar payout process
Outsourcing in Hackerone and Bugcroud
How to Hackerone and Bugcroud
First Bug Report in Hackerone and Bugcroud
Extra if need:
HTML and CSS Injection
Remote Code Execution and Directory Traversing
Hacking Mobile Platforms
17 freelancers are bidding on average $24/hour for this job
hello sir I am an ethical hacker and a cyber security specialist. I have a completed a 6 month course which comprised of most of the topics mentioned in the project except Malware analysis. I am ready to teach others .