Ethical Hacking CourseĀ
Introduction to Basics of Ethical Hacking
Footprinting Active (Tool-Based Practical)
Footprinting Passive (Passive Approach)
In-depth Network Scanning
Enumeration and User Identification
System Hacking: Password Cracking & Bypassing
Viruses and Worms
Trojans and Backdoors
Bots and Botnets
Sniffers: MITM with Kali
Sniffers: MITM with Windows
Social Engineering Techniques: Theoretical Approach
Social Engineering Toolkit: Practical Based Approach
Denial of Service (DoS) & Distributed Denial of Service (DDoS) Attacks
Web Session Hijacking
SQL Injection: Manual Testing
SQL Injection: Automated Tool-Based Testing
Basics of Web Application Security
Hacking Web Servers: Server Rooting
Hacking Wireless Networks: Manual CLI Based
Hacking Wireless Networks
Evading IDS and Firewall
Honeypots
Buffer Overflow
Cryptography
Penetration Testing: Basics
Mobile Hacking
Internet of Things (IoT) Hacking
Cloud Security and Many More