Example Curriculum

  1. Introduction To Ethical Hacking
Available in days
days after you enroll
  2. Basics of Networking
Available in days
days after you enroll
  3. Virtualization and Basics of Kali Linux
Available in days
days after you enroll
  4. Footprinting
Available in days
days after you enroll
  5. Scanning and vulnerability assessment
Available in days
days after you enroll
  6. Penetration testing and enumeration
Available in days
days after you enroll

This course is closed for enrollment.