Course Outline

Module 1: Introduction to Ethical Hacking
Module 2: Footprinting and Reconnaissance
Module 3: Scanning Networks
Module 4: Enumeration
Module 5: System Hacking
Module 6: Trojans and Backdoors
Module 7: Viruses and Worms
Module 8: Sniffers
Module 9: Social Engineering
Module 10: Denial of Service
Module 11: Session Hijacking
Module 12: Hacking Webservers
Module 13: Hacking Web applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks(theory or practice based on mode of delivery)
Module 16: Hacking Mobile Platforms
Module 17: Evading IDS, Firewalls and Honeypots
Module 18: Buffer Overflow
Module 19: Cryptography
Module 20: Penetration Testing

Requirements

There are no specific requirements needed to attend this course.

  35 Hours
 

Testimonials

Related Courses

CAS for Administrators

  7 hours

CHFI - Certified Digital Forensics Examiner

  35 hours

PKI: Implement and Manage

  21 hours

Security Analyst

  35 hours

WEBAP - Web Application Security

  28 hours

Node.JS and Web Application Security

  21 hours

Embedded Systems Security

  21 hours

Interactive Application Security Testing (IAST)

  14 hours

Apache Shiro: Securing Your Java Application

  7 hours

Ethical Hacker

  35 hours

NetNORAD

  7 hours

Network Security Administrator

  35 hours

Web Security with the OWASP Testing Framework

  28 hours

Securing Windows Using PowerShell Automation

  42 hours

Shadowsocks: Set Up a Proxy Server

  7 hours