ETHICAL HACKING
NAME OF THE COURSE:
ETHICAL HACKING
LEVEL:
Certificate Course
LEARNING MODULES:
Ethical Hacking Overview and Threats Hacking Concepts
Security Controls
Security Controls Part 2
Pentesting, Laws, and Standards Footprinting
Host Discovery and Scanning with Nmap ProxyChains and Enumeration Vulnerability Analysis Concepts and Tools
Password Attacks
Password Attacks Part 2
Privilege Escalation
Covert Data Gathering
Hidden Files and Covering Tracks
34
Malware Threats
Malware Distribution
Network Sniffing
Social Engineering
Denial of Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Evading IDS, Firewalls, and Honeypots Part 2 Evading IDS, Firewalls, and Honeypots Part 3 Hacking Web Servers
Common Web App Threats
Common Web App Threats Part 2 Practical Web App Hacking
SQL Injection
SQL Injection Types and Tools Wireless Hacking Concepts Wireless Hacking Tools
Wireless Hacking Common Threats Cracking and Mobile Hacking
IoT Concepts
IoT Attacks
IoT Hacking and Countermeasures Clouding Computing Concepts Cloud Computer Attacks
35
Cryptography Concepts Cryptography Concepts Part 2 Cryptography Concepts Part 3 Cryptography Attacks