Skip to content
Module 01: Introduction to Ethical Hacking
- Information Security Overview
- Hacking Concepts, Phases & Types
- Legal Aspects of Ethical Hacking
- Penetration Testing vs Ethical Hacking
Module 02: Footprinting and Reconnaissance
- Footprinting Concepts and Methodologies
- Tools for Footprinting
- Competitive Intelligence
- DNS Footprinting & WHOIS
- Email, Social Media, Website Footprinting
Module 03: Scanning Networks
- Network Scanning Techniques
- Port Scanning & Banner Grabbing
- Vulnerability Scanning
- Tools: Nmap, NetScan, etc.
Module 04: Enumeration
- Enumeration Techniques and Tools
- NetBIOS, SNMP, LDAP, NFS, SMB Enumeration
- Active Directory Enumeration
Module 05: Vulnerability Analysis
- Understanding Vulnerability Concepts
- Vulnerability Assessment Types
- Tools: Nessus, OpenVAS, Nexpose, etc.
Module 06: System Hacking
- Password Cracking Techniques
- Privilege Escalation
- Malware Hiding Techniques
- Keylogging, Spyware, and Rootkits
- Steganography and Anti-Forensics
Module 07: Malware Threats
- Viruses, Worms, Trojans
- Ransomware & Backdoors
- Malware Analysis Techniques
- Countermeasures
Module 08: Sniffing
- Packet Sniffing Concepts
- ARP Spoofing and MAC Flooding
- DHCP Attacks
- Wireshark and Sniffing Tools
Module 09: Social Engineering
- Social Engineering Techniques
- Phishing, Vishing, Impersonation
- Insider Threats
- Countermeasures
Module 10: Denial-of-Service (DoS)
- DoS/DDoS Attack Techniques
- Botnets and Zombies
- Tools: LOIC, HOIC, HULK, etc.
- Detection and Mitigation Techniques
Module 11: Session Hijacking
- Session Hijacking Techniques
- TCP/IP Hijacking, Cross-Site Request Forgery
- Countermeasures
Module 12: Evading IDS, Firewalls, and Honeypots
- IDS/IPS/Firewall Evasion Techniques
- Tools: Nmap, Hping, Scapy
- Honeypot Evasion
Module 13: Hacking Web Servers
- Web Server Vulnerabilities
- Misconfigurations & Exploits
- Attacks on Apache, IIS, and Nginx
Module 14: Hacking Web Applications
- OWASP Top 10
- SQL Injection, XSS, CSRF, RFI/LFI
- Web Application Vulnerability Scanners
Module 15: SQL Injection
- SQL Injection Techniques
- Database Exploitation
- Countermeasures
Module 16: Hacking Wireless Networks
- Wireless Encryption (WEP/WPA/WPA2/WPA3)
- Rogue APs, Evil Twins
- Wireless Sniffing Tools (Aircrack-ng, Kismet)
Module 17: Hacking Mobile Platforms
- Android and iOS Threats
- Mobile App Security
- Mobile Device Management (MDM)
Module 18: IoT and OT Hacking
- IoT Architecture and Threats
- SCADA/ICS Hacking
- Security Challenges in IoT
Module 19: Cloud Computing
- Cloud Service Models
- Cloud Threats and Attacks
- Security in AWS, Azure, GCP
Module 20: Cryptography
- Cryptographic Algorithms and Attacks
- Public Key Infrastructure (PKI)
- Hashing, Digital Signatures
- Steganography