Example Curriculum

  1. Introduction To Ethical Hacking
Available in days
days after you enroll
  2. Basics of Networking
Available in days
days after you enroll
  3. Virtualization and Basics of Kali Linux
Available in days
days after you enroll
  4. Footprinting
Available in days
days after you enroll
  5. Scanning and vulnerability assessment
Available in days
days after you enroll
  6. Penetration testing, enumeration, windows hacking - creating malicious payload
Available in days
days after you enroll
  6. Hacking Windows - Password cracking, Keyloggers, spywares
Available in days
days after you enroll
  7. Introduction To malwares - Trojan, RAT, Virus and Worm
Available in days
days after you enroll
  8. Stegnography and Cryptography
Available in days
days after you enroll
  9. Cryptography part 2 , cloud computing and Social Engineering and Phishing
Available in days
days after you enroll
  10. Sniffing
Available in days
days after you enroll
  11. DOS and DDOS
Available in days
days after you enroll
  12. SQL Injection and IOT
Available in days
days after you enroll
  13. Cross Site Scripting
Available in days
days after you enroll
  13. Hacking wireless Network
Available in days
days after you enroll
  14. Hiding files and clearing tracks, Email HAcking - 26 May
Available in days
days after you enroll
  15. web server hacking, firewall, IDS,IPS, Honeypots - 28 may
Available in days
days after you enroll
  16. Session Hijacking
Available in days
days after you enroll
  17. Mobile Platform Hacking
Available in days
days after you enroll

This course is closed for enrollment.