Curriculum
11 Sections
35 Lessons
10 Weeks
Expand all sections
Collapse all sections
Module 1: Introduction to Ethical Hacking
4
1.1
What is Ethical Hacking?
1.2
Types of Hackers (White, Black, Grey)
1.3
Legal and Ethical Considerations
1.4
Overview of Cybersecurity Landscape
Module 2: Setting Up Your Lab
4
2.1
Installing Kali Linux / Parrot OS
2.2
Virtual Machines (VirtualBox, VMware)
2.3
Networking Basics for Hackers
2.4
Introduction to Offensive Security Tools
Module 3: Footprinting and Reconnaissance
3
3.1
Passive vs Active Reconnaissance
3.2
WHOIS, DNS Interrogation, OSINT
3.3
Tools: Nmap, Maltego, Recon-ng
Module 4: Scanning and Enumeration
4
4.1
Network Scanning Techniques
4.2
Vulnerability Scanning
4.3
Banner Grabbing
4.4
Enumerating Services
Module 5: Gaining Access
3
5.1
Exploitation Techniques
5.2
Buffer Overflows, SQL Injection, XSS
5.3
Brute Force Attacks
Module 6: Maintaining Access
3
6.1
Backdoors and Rootkits
6.2
Creating Persistence
6.3
Covering Tracks
Module 7: Privilege Escalation
3
7.1
Linux and Windows Escalation Techniques
7.2
SUID/SGID, Unquoted Path Vulnerabilities
7.3
Kernel Exploits
Module 8: Web Application Hacking
3
8.1
OWASP Top 10
8.2
Cross-Site Scripting, SQLi, CSRF, File Inclusion
8.3
Tools: Burp Suite, OWASP ZAP
Module 9: Wireless Hacking
3
9.1
Wi-Fi Encryption Standards
9.2
Cracking WEP/WPA
9.3
Rogue Access Points and Evil Twin Attacks
Module 10: Social Engineering
3
10.1
Types of Social Engineering Attacks
10.2
Phishing, Vishing, Tailgating
10.3
Defending Against Social Engineering
Module 11: Introduction to Penetration Testing
2
11.1
Stages of a Pen Test
11.2
Reporting and Documentation
Ethical Hacking
Search
This content is protected, please
login
and enroll in the course to view this content!
WhatsApp us
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content