Course Outline

Module 1: Introduction to Ethical Hacking
Module 2: Footprinting and Reconnaissance
Module 3: Scanning Networks
Module 4: Enumeration
Module 5: System Hacking
Module 6: Trojans and Backdoors
Module 7: Viruses and Worms
Module 8: Sniffers
Module 9: Social Engineering
Module 10: Denial of Service
Module 11: Session Hijacking
Module 12: Hacking Webservers
Module 13: Hacking Web applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks(theory or practice based on mode of delivery)
Module 16: Hacking Mobile Platforms
Module 17: Evading IDS, Firewalls and Honeypots
Module 18: Buffer Overflow
Module 19: Cryptography
Module 20: Penetration Testing

Requirements

There are no specific requirements needed to attend this course.

 35 Hours

Related Courses

CHFI - Certified Digital Forensics Examiner

35 Hours

Node.JS and Web Application Security

21 Hours

Embedded Systems Security

21 Hours

Interactive Application Security Testing (IAST)

14 Hours

PKI: Implement and Manage

21 Hours

Securing Windows Using PowerShell Automation

42 Hours

Security Analyst

35 Hours

WEBAP - Web Application Security

28 Hours

Advanced PHP and Secure Coding Course

35 Hours

Automotive Cyber Security Fundamentals

21 Hours

Business Continuity Practitioner

14 Hours

BCS Practitioner Certificate in Business Continuity Management

21 Hours

BeyondCorp: Implementing Zero Trust Security

14 Hours

CAS for Administrators

7 Hours

Crypto Currencies and the Blockchain

7 Hours

Related Categories