Total Class Modules: 35
Total Class: 50
Module 01: Introduction to Ethical Hacking
What is Ethical Hacking?
Phase of Hacking
Cybercrime and Cyber Attack
Need of an Ethical Hacker?
Why do we have to learn Ethical Hacking?
Skills of an Ethical Hacker
How to Become an Ethical Hacker
Ethical Hacker Career Roadmap
Assignment
Module 02: Social Media Hacking [Social Engineering Lab ]
Facebook Hacking
WhatsApp Hacking
Imo Hacking
Twitter Hacking
Instagram Hacking
All social Media
Social Media account recovery process.
Fb / Gmail Account Security, Recover, Disable concept.
Assignment
Module 03: Social Engineering Theory
What is Social Engineering?
Phase of Social Engineering
Types of Social Engineering
Impact of Social Engineering
Social Engineering Tools
Lab
Some More++
Assignment
Module 04: Footprinting and Information Gathering
From Social Media
Web server Whois
subdomain
Reserved IP Location
Which platform used for developing
Ping to identify server details
Collecting Information from Email Header
Email Tracking Tools
Tracking of a target person
Website Cookies history
Recover any deleted files. [ PC or Mobile ]
Assignment
Module 05: Footprinting and Information Gathering Lab
OSINT Tools
Practical
Assignment
Module 06: Digital Forensic
Module 07: Programming languages
Module 08: Website Penetration Testing
What is website Penetration Testing
Website Penetration Testing Tools
Discussion of the different types of vulnerabilities
Defining a web application test scope and process
Defining types of penetration testing
Tools and manual process of penetration testing
Some More ++
Assignment
Module 09: Website Hacking
Web Attacking method
SQL Injection
Session Hijacking
Private exploit of Team Matrix
Target Server Exploit
Bypass
Shell upload
Private shell script
Compromising Session IDs using Sniffing
Compromising Session IDs by Predicting Session Token
Assignment
Module 10: System Hacking
Module 11: Malware
What is Malware
Types of Malware
Keylogger, Ransomware, Rat
Impact of Malware
How to make Rat, Ransomware?
How to Create Malware?
How to Bind Malware file in Real setup File?
Paid course on keylogger project [free]
Malware Practical
Some More+++
Assignment
Module 12: Malware Analysis/Forensics
Module 13: Website Development
WordPress
CMS
Cpanel
Hosting, Domain
Develop a new website
Lab
Some More++
Assignment
Module 14: Website Security
Website Security
Web Server security,
cPanel Security
WordPress Security
Lab
Some More+++
Assignment
Module 15: Denial-of-Service
DoS/DDoS Concepts
DoS/DDoS Attack Techniques
DDoS Case Study
DoS/DDoS Attack Tools
Countermeasures
DoS/DDoS Protection Tools
DoS/DDoS Attack Penetration Testing
Live DDOS attack
Lab
Some More+++
Assignment
Module 16: SQL Injection
Union Base
WAF Bypass
Base 64
Blind SQL Injection
Error Base
POST base SQL Injection
SQL Injection Tools
Live SQL Practice
Lab
Some More+++
Assignment
Module 17: Password Cracking
What is Password Cracking?
Types of Password Cracking
Online/Offline Password Attack
Bruteforce Attack
Dictionary Attack
Tools
Practical
Some More+++
Assignment
Module 18: Evading IDS, Firewalls, and Honeypots
RFI/LFI
X-path
Cryptography
Cryptography Tools
Steganography
Steganography tools
Some More+++
Module 19: Scanning Networks web server
NMAP
Wpscan
Acunotix
Prepare Proxies
Proxy Tool
Proxy Tools for Mobile
Free Proxy Servers
Scanning Pen Testing
Module 20: Hacker Lab Setup
What is Hacker Lab
Kali Linux Lab Setup
Parrot Lab Setup
Windows Lab Setup
Andriod Lab Setup
Server Lab Setup
Online Lab Setup
Practical
Some More++
Assignment
Module 21: Linux - Kali Linux
Linux Basic
Kali Linux
Kali Linux Tools Uses
Github Tools
Some More+++
Assignment
Module 22: Android
Android Hacking
Android Lab setup
Andriod Rat
Some More+++
Assignment
Module 23: Attack
Login Page injection
Cross Site Scripting
Authentication Bypass
Burpsuite
Some More+++
Assignment
Module 24: Wifi Hacking / Wireless Networks
Module 25: CTF (Capture the flag)
CTF Concepts
CTF types and Methods
CTF Challenges
CTF Live Practice
CTF Resources
Tryhackme Room Solve
Assignment
Module 26: Dark/Deep Web
Module 27: Vulnerability Assessment
Module 28: Bug Bounty & Pentesing
Module 29: Freelancing
What is Fiverr & Freelancer?
What type of work would suit you?
How to create a GIG and Sell it?
Fiverr freelancing support.
Order and Payment
Dollar payout process
Assignment
Bonus concepts: Account Cracking Basic
Extra if needed: [Resource Support]