Course Syllabus

Ethical Hacking Course Highlights

Ethical Hacking  has been gaining popularity for quite some time and is currently in high-demand. Ethical Hacking is an exciting career path for both freshers and experienced individuals


Information Security Overview

Information Security Threats and Attack Vectors

Testing Concepts

Hacking Concepts

Ethical Hacking Concepts

Information Security Controls

Information Security Laws and Standards


Footprinting Concepts

Footprinting Tools

Countermeasures

Network Scanning Concepts

Scanning Tools

Scanning Techniques


Enumeration Concepts

Enumeration Countermeasures

Other Enumeration Techniques

Vulnerability Assessment Concepts

Vulnerability Assessment Solutions

Vulnerability Scoring Systems

Vulnerability Assessment Tools

Vulnerability Assessment Reports


System Hacking Concepts

Cracking Passwords

Escalating Privileges

Executing Applications

Hiding Files

Covering Tracks


Malware Concepts

Trojan Concepts

Virus and Worm Concepts

Malware Analysis

Countermeasures

Anti-Malware Software


Sniffing Concepts

Sniffing Technique

Sniffing Tools

Countermeasures

Sniffing Detection Techniques

DoS/DDoS Concepts

DoS/DDoS Attack Techniques

DoS/DDoS Attack Tools

Countermeasures

DoS/DDoS Protection Tools

IDS, Firewall, and Honeypot Concepts

IDS, Firewall, and Honeypot Solutions

Evading IDS

Evading Firewalls

IDS/Firewall Evading Tools

Detecting Honeypots

IDS/Firewall Evasion

Countermeasures


Cryptography Concepts

Encryption Algorithms

Cryptography Tools

Public Key Infrastructure (PKI)

Cryptanalysis

Countermeasures


Hacking Web Servers

Evading IDS, Firewalls, and Honeypots

Hacking Web Applications

Hacking Wireless Networks

Hacking Mobile Platforms