Â
- Module 01: Introduction to Ethical Hacking
- Module 02: Footprinting and Reconnaissance
- Module 03: Scanning Networks
- Module 04: Enumeration
- Module 05: Vulnerability Analysis
- Module 06:Â System Hacking
- Module 07:Â Malware Threats
- Module 08:Â Sniffing
- Module 09:Â Social Engineering
- Module 10:Â Denial-of-Service
- Module 11:Â Session Hijacking
- Module 12:Â Evading IDS, Firewalls, and Honeypots
- Module 13:Â Hacking Web Servers
- Module 14:Â Hacking Web Applications
- Module 15:Â SQL Injection
- Module 16:Â Hacking Wireless Networks
- Module 17:Â Hacking Mobile Platforms
- Module 18:Â Cloud Computing
- Module 19:Â Cryptography
- A Hand-on experience on Kali Linux
- Bug Bounty Hunting
- API Penetration testing