Detailed Course Modules

A comprehensive, industry-aligned roadmap to professional ethical hacking.

  • Basics of security
  • Scope of ethical hacking
  • Legal and regulatory aspects
  • Information gathering
  • OSINT tools and techniques
  • Search engine footprinting
  • Network discovery
  • Port scanning tools (Nmap)
  • Vulnerability scanning
  • Extracting user info
  • Group and service info extraction
  • SMTP/DNS enumeration
  • Identifying system weaknesses
  • Vulnerability assessment tools
  • Scoring systems
  • Password cracking
  • Privilege escalation
  • Spyware and rootkits
  • Viruses, worms, and Trojans
  • Malware analysis
  • Countermeasures
  • Packet capture
  • MITM (Man-in-the-Middle) attacks
  • MAC/DNS spoofing
  • Psychological manipulation
  • Phishing techniques
  • Insider threats
  • DoS/DDoS techniques
  • Botnets
  • Defense strategies
  • Exploiting active sessions
  • Network/Application level hijacking
  • Prevention
  • Stealth techniques
  • Bypassing firewalls
  • Honeypot detection
  • Exploiting server vulnerabilities
  • Web server attack methodology
  • Patch management
  • SQL Injection
  • XSS (Cross-Site Scripting)
  • CSRF attacks
  • Database exploitation
  • In-band/Out-of-band injection
  • Blind SQLi
  • Wi-Fi attacks
  • WPA/WPA2/WPA3 cracking
  • Wireless security tools
  • Android/iOS vulnerabilities
  • Mobile malware
  • MDM security
  • Smart device vulnerabilities
  • Industrial system security
  • IoT botnets
  • Cloud-specific threats
  • Container security
  • Cloud defenses
  • Encryption and hashing
  • PKI attacks
  • Digital signatures