Curriculum
- 20 Sections
- 20 Lessons
- 40 Hours
Expand all sectionsCollapse all sections
- Module 01: Introduction to Ethical Hacking1
- Module 02: Foot Printing and Reconnaissance1
- Module 03: Scanning Networks1
- Module 04: Enumeration1
- Module 05: Vulnerability Analysis1
- Module 06: System Hacking1
- Module 07: Malware Threats1
- Module 08: Sniffing1
- Module 09: Social Engineering1
- Module 10: Denial-of-Service1
- Module 11: Session Hijacking1
- Module 12: Evading IDS, Firewalls, and Honeypots1
- Module 13: Hacking Web Servers1
- Module 14: Hacking Web Applications1
- Module 15: SQL Injection1
- Module 16: Hacking Wireless Networks1
- Module 17: Hacking Mobile Platforms1
- Module 18: IoT and OT Hacking1
- Module 19: Cloud Computing1
- Module 20: Cryptography1
Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems.Copy
Prev
Get an introduction to the different types of malware, such as Trojans, viruses, and worms, as well as system auditing for malware attacks, malware analysis, and countermeasures.Copy
Next