Detailed Course Modules
A comprehensive, industry-aligned roadmap to professional ethical hacking.
- Basics of security
- Scope of ethical hacking
- Legal and regulatory aspects
- Information gathering
- OSINT tools and techniques
- Search engine footprinting
- Network discovery
- Port scanning tools (Nmap)
- Vulnerability scanning
- Extracting user info
- Group and service info extraction
- SMTP/DNS enumeration
- Identifying system weaknesses
- Vulnerability assessment tools
- Scoring systems
- Password cracking
- Privilege escalation
- Spyware and rootkits
- Viruses, worms, and Trojans
- Malware analysis
- Countermeasures
- Packet capture
- MITM (Man-in-the-Middle) attacks
- MAC/DNS spoofing
- Psychological manipulation
- Phishing techniques
- Insider threats
- DoS/DDoS techniques
- Botnets
- Defense strategies
- Exploiting active sessions
- Network/Application level hijacking
- Prevention
- Stealth techniques
- Bypassing firewalls
- Honeypot detection
- Exploiting server vulnerabilities
- Web server attack methodology
- Patch management
- SQL Injection
- XSS (Cross-Site Scripting)
- CSRF attacks
- Database exploitation
- In-band/Out-of-band injection
- Blind SQLi
- Wi-Fi attacks
- WPA/WPA2/WPA3 cracking
- Wireless security tools
- Android/iOS vulnerabilities
- Mobile malware
- MDM security
- Smart device vulnerabilities
- Industrial system security
- IoT botnets
- Cloud-specific threats
- Container security
- Cloud defenses
- Encryption and hashing
- PKI attacks
- Digital signatures