- Introduction to the Course
- What is Hacking
- Installation
- Executing System Commands
- Changing MAC
- Creating Network Scanner
- Source Code
- Man in the Middle Attack
- Intercepting Packets
- Malware – Creating own Malware Backdoor RAT
- Malware – File System Navigation
- Malware – Uploading Virus to Victim
- Malware – Downloading Files from Victim
- Malware – Stealing Folders from Victim
- Trojan – packing a malware
- Keylogger
- Stegnography
- Protection – How to protect yourself when online
Check Also
12th MOOC on “Overview of Space Exploration” by ISRO
Space Science and technology are exciting areas for scientists and researchers which has greatly impacted …