Total Class Modules: 46
Total Class: 55+
Module 01: Introduction to Ethical Hacking
What is Ethical Hacking?
Phase of Hacking
Cybercrime and Cyber Attack
Need of an Ethical Hacker?
Why do we have to learn Ethical Hacking?
Skills of an Ethical Hacker
How to Become an Ethical Hacker
Ethical Hacker Career Roadmap
Assignment
Module 02: Introduction to Cyber Security
What is Cybersecurity?
What is Offensive Security
What is Defensive Security
Different Types of Cyber Security Teams
OWASP Top 10 Web Application Threat Vectors
Cyber Threat Intelligence
The CIA Triad
Security Information Event Management (SIEM)
Information security audit
Roles in Cybersecurity
Cybercriminals
Assignment
Module 03: Hacker Lab
What is Hacker Lab
Hacker Lab Requirements
Hacker lab Setup Process
Kali Linux Lab Setup
Parrot Setup
Android Setup
Server Lab Setup
Online Lab Setup
Assignment
Module 03: Advanced Cybersecurity Lab
What is Advanced Cybersecurity Lab
Advanced Cybersecurity Lab Requirements
Advanced Cybersecurity Lab Setup Process
Windows Server Setup
Different Type Vulnerable Machine Lab Setup
Advanced Cybersecurity Tools Setup
Hidden *
Hidden*
Hidden*
Assignment
Module 04: Linux
What is Linux
Linux vs Windows
Linux Basic Command
Kali Linux Basic Command
Assignment
Module 05: Linux - Kali Linux
Module 06: Linux - Parrot
Module 07: Information Gathering - OSINT
Module 08: Information Gathering - OSINT Advanced
Hidden*
Project [Assignment]
Module 09: Networking
Module 10: Scanning Network
Namp
Nikto
wpscan
Acunetix
Directory scan
Hidden*
Assignment
Module 10: Scanning Advanced
Hidden*
Project [Assignment]
Module 11: Enumeration
Module 12: Vulnerability Analysis
Module 13: System Hacking
Module 14: Denial-of-Service
Module 15: Programming languages
Module 16: Malware Threats and Analysis/Forensics
Module 16: Malware Analysis/Forensics
Module 16: Pc Malware
Module 17: Digital Forensic
Module 18: Digital Forensic Project
Hidden*
Project [Assignment]
Module 18: Password Cracking
Module 19: Sql Inection
Module 20: Sql Inection 2
Module 20: LFI RFI
Module 20: XSS
Module 21: Hacking Web Applications
Module 21: Web Deface -1
Module 22: Web Deface -2
Module 22: Web Deface -3
Module 23: Hacking Web Servers
Module 24: Hacking Mobile Platforms
Module 25: Hacking Wireless(Wifi) Networks
Module 26: Sniffing
Module 27: Session Hijacking
Module 28: Evading IDS, Firewalls, and Honeypots
Module 29: IoT and OT Hacking
Module 30: Cloud Computing
Module 31: Cryptography
Module 32: Steganography
Module 32: CTF (Capture the flag)
CTF Concepts
CTF types and Methods
CTF Challenges
CTF Live Practice
CTF Resources
Tryhackme Room Solve
Hidden*
Assignment
Module 33: Penetration test (Pentesting]
What is pentesting
pentesting methodology
Hidden*
Assignment
Module 34: Pentesting Project
What is Pentesting
Pentesting methodology
Hidden*
Assignment
Module 35: Exploit
What is Expolit
Exploit Database
Hidden*
Assignment
Module 36: Exploit
What is Expolit
Exploit Database
Hidden*
Assignment
Module 37: Bug Hunting/Bug Bounty
What is Bug Hunting
What is Bug Bounty
Hidden*
Assignment
Module 38: Bug Hunting/Bug Bounty Project
Module 39: Warkshark
Module 40: Warkshark 2
Module 41: Metasploit
Module 42: Metasploit 2
Module 43: Dark/Deep Web
Module 44: Social Engineering
Module 45: Course Overview
Module 45: Freelancing