Curriculum
- 20 Sections
- 20 Lessons
- 40 Hours
Expand all sectionsCollapse all sections
- Module 01: Introduction to Ethical Hacking1
- Module 02: Foot Printing and Reconnaissance1
- Module 03: Scanning Networks1
- Module 04: Enumeration1
- Module 05: Vulnerability Analysis1
- Module 06: System Hacking1
- Module 07: Malware Threats1
- Module 08: Sniffing1
- Module 09: Social Engineering1
- Module 10: Denial-of-Service1
- Module 11: Session Hijacking1
- Module 12: Evading IDS, Firewalls, and Honeypots1
- Module 13: Hacking Web Servers1
- Module 14: Hacking Web Applications1
- Module 15: SQL Injection1
- Module 16: Hacking Wireless Networks1
- Module 17: Hacking Mobile Platforms1
- Module 18: IoT and OT Hacking1
- Module 19: Cloud Computing1
- Module 20: Cryptography1
Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures
Prev
Understand the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
Next