Module 01: Introduction to Ethical Hacking

  • Information Security Overview
  • Hacking Concepts, Phases & Types
  • Legal Aspects of Ethical Hacking
  • Penetration Testing vs Ethical Hacking

Module 02: Footprinting and Reconnaissance

  • Footprinting Concepts and Methodologies
  • Tools for Footprinting
  • Competitive Intelligence
  • DNS Footprinting & WHOIS
  • Email, Social Media, Website Footprinting

Module 03: Scanning Networks

  • Network Scanning Techniques
  • Port Scanning & Banner Grabbing
  • Vulnerability Scanning
  • Tools: Nmap, NetScan, etc.

Module 04: Enumeration

  • Enumeration Techniques and Tools
  • NetBIOS, SNMP, LDAP, NFS, SMB Enumeration
  • Active Directory Enumeration

Module 05: Vulnerability Analysis

  • Understanding Vulnerability Concepts
  • Vulnerability Assessment Types
  • Tools: Nessus, OpenVAS, Nexpose, etc.

Module 06: System Hacking

  • Password Cracking Techniques
  • Privilege Escalation
  • Malware Hiding Techniques
  • Keylogging, Spyware, and Rootkits
  • Steganography and Anti-Forensics

Module 07: Malware Threats

  • Viruses, Worms, Trojans
  • Ransomware & Backdoors
  • Malware Analysis Techniques
  • Countermeasures

Module 08: Sniffing

  • Packet Sniffing Concepts
  • ARP Spoofing and MAC Flooding
  • DHCP Attacks
  • Wireshark and Sniffing Tools

Module 09: Social Engineering

  • Social Engineering Techniques
  • Phishing, Vishing, Impersonation
  • Insider Threats
  • Countermeasures

Module 10: Denial-of-Service (DoS)

  • DoS/DDoS Attack Techniques
  • Botnets and Zombies
  • Tools: LOIC, HOIC, HULK, etc.
  • Detection and Mitigation Techniques

Module 11: Session Hijacking

  • Session Hijacking Techniques
  • TCP/IP Hijacking, Cross-Site Request Forgery
  • Countermeasures

Module 12: Evading IDS, Firewalls, and Honeypots

  • IDS/IPS/Firewall Evasion Techniques
  • Tools: Nmap, Hping, Scapy
  • Honeypot Evasion

Module 13: Hacking Web Servers

  • Web Server Vulnerabilities
  • Misconfigurations & Exploits
  • Attacks on Apache, IIS, and Nginx

Module 14: Hacking Web Applications

  • OWASP Top 10
  • SQL Injection, XSS, CSRF, RFI/LFI
  • Web Application Vulnerability Scanners

Module 15: SQL Injection

  • SQL Injection Techniques
  • Database Exploitation
  • Countermeasures

Module 16: Hacking Wireless Networks

  • Wireless Encryption (WEP/WPA/WPA2/WPA3)
  • Rogue APs, Evil Twins
  • Wireless Sniffing Tools (Aircrack-ng, Kismet)

Module 17: Hacking Mobile Platforms

  • Android and iOS Threats
  • Mobile App Security
  • Mobile Device Management (MDM)

Module 18: IoT and OT Hacking

  • IoT Architecture and Threats
  • SCADA/ICS Hacking
  • Security Challenges in IoT

Module 19: Cloud Computing

  • Cloud Service Models
  • Cloud Threats and Attacks
  • Security in AWS, Azure, GCP

Module 20: Cryptography

  • Cryptographic Algorithms and Attacks
  • Public Key Infrastructure (PKI)
  • Hashing, Digital Signatures
  • Steganography

By admin