Difference between revisions of "Ethical Hacking"

From OnnoWiki
Jump to navigation Jump to search
Line 22: Line 22:
  
  
* [[Fase Penetration Testing (Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks) (en)]]
+
* [[Penetration Testing Phases (Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks) (en)]]
* [[Standar Penetration Testing (OWASP, NIST) (en)]]
+
* [[Penetration Testing Standards (OWASP, NIST) (en)]]
* [[Hands-on: Membuat Rencana Penetration Testing (en)]]
+
* [[Hands-on: Hands-on: Creating a Penetration Testing Plan (en)]]
  
 
==Reconnaissance (Information Gathering)==
 
==Reconnaissance (Information Gathering)==

Revision as of 08:45, 19 October 2024

Outline kuliah Ethical Hacking untuk 15 modul dengan fokus pada pengetahuan praktis dan skill hacking. Tiap pertemuan menggabungkan teori dan hands-on lab untuk mengembangkan keterampilan secara bertahap:

Pengantar Ethical Hacking


Metodologi Penetration Testing


Reconnaissance (Information Gathering)


Scanning dan Enumeration


Exploitation Basics


Web Application Hacking - Bagian 1


Web Application Hacking - Bagian 2


Password Cracking dan Authentication Bypass


Wireless Network Hacking


Social Engineering


Privilege Escalation


Post-Exploitation dan Maintaining Access


Mobile Hacking


Capture The Flag (CTF) Challenge dan Review

Report Penetration Test