Home >
CSE& IT Courses >>
Ethical Hacking
Ethical Hacking
Curriculum
Introduction to hacking
What is hacking
Who is hacker
Types of hackers
Categories of hacker
Terminologies of hacking
Phases of hacking
Cia triad
Building virtual lab for pen test
What is virtualization
Needs of virtualization
Virtual machine installation
Windows xp installation in virtual machine
Windows 7 installation in virtual machine
Kali linux installation in virtual machine
The kali linux
Introduction to kali linux
Basic command for kali linux
Information gathering
What is foortprinting and reconnaissance
Types of footprintings
Footprinting through search engine
Footprinting through social engineering
Footprinting through social networking sites
Website footprinting
Competitive intelligence
Whois footprinting
Footprinting using advanced google hacking techniques
Email footprinting
Dns footprinting
Network footprinting
Networking basics
What is network
Types of networking
What is internet protocol
What is ip address
What is ping
What is traceroute
What is ipv4
What is ipv6
What is static ip address
What is dynamic ip address
Public vs private ip
What is router, hub, switch
What is proxy
What is vpn
Spoofing
Introduction to spoofing
Mac spoofing
Email spoofing
Call spoofing
Precautions
Social engineering
Introduction to social engineering
What is phishing
Facebook hacking by se-tool kit
Manual facebook hacking
Gmail hacking with online sites
Precautions
System hacking
Windows password changing with knowing the previous one
Windows password knowing
Windows password bypassing
Securing measures
Sniffing
Introduction to sniffing
Introduction to man in the middle attack
Practical on man in the middle
Dos & ddos
Introduction to dos and ddos
Practical on dos and ddos
Precautions
Malwares
Introduction to malwares
Types of malwares
Virus and worms
Introduction to virus
Creation of virus
Introduction to worm
Creation of worm
Introduction to backdoor
Creation of backdoor
Introduction to trojan
Creation of trojan
Precautions
Mobile hacking
Mobile hacking with kali linux
Mobile hacking with online sites
Precautions
Digital forensics
How data stores on harddisk
Recover deleted or formatted data from usb, hdd, or mobile phones
Steganography
Introduction to steganography
Hiding data in media files
Wireless hacking
Introduction to wireless hacking
How to hack wifi
Carding
Introduction to carding
Categories involved in carding
How to hacking credit card
Precautions
Dark web
Introduction to dark web
Levels of web
Operation of dark web
Precautions
Antivirus
Enroll Now