Course Outline
Module 1: Introduction to Ethical Hacking
Module 2: Footprinting and Reconnaissance
Module 3: Scanning Networks
Module 4: Enumeration
Module 5: System Hacking
Module 6: Trojans and Backdoors
Module 7: Viruses and Worms
Module 8: Sniffers
Module 9: Social Engineering
Module 10: Denial of Service
Module 11: Session Hijacking
Module 12: Hacking Web servers
Module 13: Hacking Web applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks (theory or practice, depending on the mode of delivery)
Module 16: Hacking Mobile Platforms
Module 17: Evading IDS and Honeypots
Module 18: Buffer Overflow
Module 19: Cryptography
Module 20: Penetration Testing
Requirements
There are no specific requirements to attend this course.
Testimonials (1)
The really lot of extra tools that was mentioned and the real life examples form Mane's experience.