Course Syllabus

Ethical Hacking Course Highlights

Ethical Hacking  has been gaining popularity for quite some time and is currently in high-demand. Ethical Hacking is an exciting career path for both freshers and experienced individuals

Information Security Overview

Information Security Threats and Attack Vectors

Testing Concepts

Hacking Concepts

Ethical Hacking Concepts

Information Security Controls

Information Security Laws and Standards

Footprinting Concepts

Footprinting Tools


Network Scanning Concepts

Scanning Tools

Scanning Techniques

Enumeration Concepts

Enumeration Countermeasures

Other Enumeration Techniques

Vulnerability Assessment Concepts

Vulnerability Assessment Solutions

Vulnerability Scoring Systems

Vulnerability Assessment Tools

Vulnerability Assessment Reports

System Hacking Concepts

Cracking Passwords

Escalating Privileges

Executing Applications

Hiding Files

Covering Tracks

Malware Concepts

Trojan Concepts

Virus and Worm Concepts

Malware Analysis


Anti-Malware Software

Sniffing Concepts

Sniffing Technique

Sniffing Tools


Sniffing Detection Techniques

DoS/DDoS Concepts

DoS/DDoS Attack Techniques

DoS/DDoS Attack Tools


DoS/DDoS Protection Tools

IDS, Firewall, and Honeypot Concepts

IDS, Firewall, and Honeypot Solutions

Evading IDS

Evading Firewalls

IDS/Firewall Evading Tools

Detecting Honeypots

IDS/Firewall Evasion


Cryptography Concepts

Encryption Algorithms

Cryptography Tools

Public Key Infrastructure (PKI)



Hacking Web Servers

Evading IDS, Firewalls, and Honeypots

Hacking Web Applications

Hacking Wireless Networks

Hacking Mobile Platforms