Curriculum

7 Topics
Training Overview Video
Overview
Introduction to Ethical Hacking
Understanding Information Security Controls
Understanding Cybersecurity Threats
Basics of Cyber Security
Setting up Ethical Hacking Lab

5 Topics
Basics of Networking
IP Address & NAT
Ports & Services
Protocols OSI and TCP/IP Model
Understanding & Using Anonimity Tools

2 Topics
Passive Information Gathering
Active Information Gathering & Reconnaissance

3 Topics
Basics of Vulnerability Assessment
Existing Vulnerability Research
Using Vulnerability Assessment Tools

3 Topics
Understanding SQL
Basic SQL Injections
Advanced SQL Injections

3 Topics
Understanding Client Side Attacks
XSS & CSRF
Attack Vectors

3 Topics
Steganography
Keyloggers
Hacking & Cracking

2 Topics
Malware Creation
Malware Detection & Removal

2 Topics
Social Engineering Threats
Preventing Social Engineering

2 Topics
Mobile Security
Mobile Malware

2 Topics
Wifi Terminologies & Attack Vectors
Wifi Security Audit & Pen Testing

3 Topics
Basics of Pen Testing
Exploitation
Reporting & Legalities of Pen Testing

2 Topics
Introduction to AI & its uses in Cyber Security
The Future with AI

  Write a Review

Online Ethical Hacking Course

Go to Paid Course