Module 1: Introduction to Ethical Hacking
- Ethical hacking defined
- Types of hackers
- Steps in the hacking process
- Footprinting and reconnaissance
Module 2: Footprinting and Reconnaissance
- Footprinting defined
- Information gathering techniques
- Scanning and enumeration
- Social engineering
Module 3: Scanning Networks
- Network scanning techniques
- Port scanning
- Vulnerability scanning
- Enumeration
Module 4: Enumeration and System Hacking
- Enumeration techniques
- System hacking steps
- Password cracking
- Sniffing
Module 5: Vulnerability Analysis
- Vulnerability Assessment Concepts
- Vulnerability Assessment Solutions
- Scoring Systems
- Tools
- Reporting
Module 6: System Hacking
- System Hacking concepts
- Cracking Passwords
- Privilege escalation
- Executing Applications
- Hiding Files
- Covering tracks
- Penetration Testing
Module 7: Malware Threats
- Malware types
- Trojans
- Viruses
- Worms
Module 8: Sniffing
- Packet sniffing
- ARP poisoning
- Sniffing tools
Module 9: Social Engineering
- Social engineering defined
- Social engineering techniques
- Identity theft
- Social engineering countermeasures
Module 10: Denial of Service
- DoS and DDoS attacks
- DoS and DDoS countermeasures
- Botnets
- DoS and DDoS tools
Module 11: Session Hijacking
- Session hijacking defined
- Types of session hijacking
- Session hijacking tools
- Session hijacking countermeasures
Module 12: Hacking Web Servers
- Web server architecture
- Web server vulnerabilities
- Web server hacking techniques
- Web server hardening
Module 13: Hacking Web Applications
- Web application architecture
- Web application vulnerabilities
- Web application hacking techniques
- Web application hardening
Module 14: SQL Injection
- SQL injection defined
- Types of SQL injection
- SQL injection tools
- SQL injection countermeasures
Module 15: Hacking Wireless Networks
- Wireless network architecture
- Wireless network vulnerabilities
- Wireless network hacking techniques
- Wireless network hardening
Module 16: Hacking Mobile Platforms
- Mobile platform architecture
- Mobile platform vulnerabilities
- Mobile platform hacking techniques
- Mobile platform hardening
Module 17: Evading IDS, Firewalls, and Honeypots
- IDS, firewalls, and honeypots defined
- Evasion techniques
- Evasion tools
- Evasion countermeasures
Module 18: IoT Hacking
- IoT Concepts
- IoT Attacks
- IoT Hacking methodology
- IoT Hacking Tools
- Countermeasures
- IoT Pentesting
Module 19: Cloud Computing
- Cloud computing defined
- Cloud computing architecture
- Cloud computing vulnerabilities
- Cloud computing hacking techniques
- Cloud computing hardening
Module 20: Cryptography
- Cryptography basics
- Symmetric and asymmetric cryptography
- Hashing
- Public key infrastructure (PKI)
Module 21: Final Exam Review
- Review of exam objectives
- Practice questions
- Test-taking strategies
Planned Duration: 6 hours per week, 4 weeks (approx. 24hrs)