Module 01 – Introduction to Ethical Hacking
Lesson 01 – Information Security Overview
Lesson 02 – Information Security Threats and Attack Vectors
Lesson 06 – Penetration Testing Concepts
Lesson 03 – Hacking Concepts
Lesson 04 – Ethical Hacking Concepts
Lesson 05 – Information Security Controls
Lesson 07 – Information Security Laws and Standards
Module 02 – Footprinting and Reconnaissance
Lesson 01 – Footprinting Concepts
Lesson 02 – Footprinting through Search Engines
Lesson 03 – Footprinting through Web Services
Lesson 04 – Footprinting through Social Networking Sites
Lesson 05 – Website Footprinting
Lesson 06 – Email Footprinting
Lesson 07 – Competitive Intelligence
Lesson 08 – Whois Footprinting
Lesson 09 – DNS Footprinting
Lesson 10- Network Footprinting
Lesson 11- Footprinting through Social Engineering
Lesson 12 – Footprinting Tools
Lesson 13 – Countermeasures
Lesson 14 – Footprinting Pen Testing
Module 03 – Scanning Networks
Lesson 01 – Network Scanning Concepts
Lesson 02 – Scanning Tools
Lesson 03 – Scanning Techniques
Lesson 04 – Scanning Beyond IDS and Firewall
Lesson 05 – Banner Grabbing
Lesson 06 – Draw Network Diagrams
Lesson 07 – Scanning Pen Testing.
Module 04 – Enumeration
Lesson 01 – Enumeration Concepts
Lesson 02 – NetBIOS Enumeration
Lesson 03 – SNMP Enumeration
Lesson 04 – LDAP Enumeration
Lesson 05 – NTP Enumeration
Lesson 06 – SMTP Enumeration and DNS Enumeration
Lesson 07 – Enumeration Countermeasures
Lesson 08 – Other Enumeration Techniques
Lesson 09 – Enumeration Pen Testing
Module 05 – Vulnerability Analysis
Lesson 01 – Vulnerability Assessment Concepts
Lesson 02 – Vulnerability Assessment Solutions
Lesson 03 – Vulnerability Scoring Systems
Lesson 04 – Vulnerability Assessment Tools
Lesson 05 – Vulnerability Assessment Reports
Module 06 – System Hacking
Lesson 01 – System Hacking Concepts
Lesson 02 – Cracking Passwords
Lesson 03 – Escalating Privileges
Lesson 04 – Executing Applications
Lesson 05 – Hiding Files
Lesson 06 – Covering Tracks
Lesson 07 – Penetration Testing.
Module 07 – Malware Threats
Lesson 01 – Malware Concepts
Lesson 02 – Trojan Concepts
Lesson 03 – Virus and Worm Concepts
Lesson 04 – Malware Analysis
Lesson 05- Countermeasures
Lesson 06- Anti-Malware Software
Lesson 07- Malware Penetration Testing
Module 08 – Sniffing
Lesson 01- Sniffing Concepts
Lesson 02- Sniffing Technique: MAC Attacks
Lesson 03- Sniffing Technique: DHCP Attacks
Lesson 04- Sniffing Technique: ARP Poisoning
Lesson 05- Sniffing Technique: Spoofing Attacks
Lesson 06- Sniffing Technique: DNS Poisoning
Lesson 07- Sniffing Tools
Lesson 08- Countermeasures
Lesson 09- Sniffing Detection Techniques
Lesson 10- Sniffing Pen Testing
Module 09- Social Engineering
Lesson 01 – Social Engineering Concepts
Lesson 02 – Social Engineering Techniques
Lesson 03- Insider Threats
Lesson 04 – Impersonation on Social Networking Sites
Lesson 05 – Identity Theft
Lesson 06 – Countermeasures
Lesson 07 – Social Engineering Penetration Testing
Module 10- Denial-of-Service
Lesson 01 – DoS/DDoS Concepts
Lesson 02 – DoS/DDoS Attack Techniques
Lesson 03 – Botnets
Lesson 04 – DDoS Case Study
Lesson 05 – DoS/DDoS Attack Tools
Lesson 06 – Countermeasures
Lesson 07 – DoS/DDoS Protection Tools
Lesson 08 – DoS/DDoS Attack Penetration Testing
Module 11- Session Hijacking
Lesson 01- Session Hijacking Concepts
Lesson 02- Application Level Session Hijacking
Lesson 03- Network Level Session Hijacking
Lesson 04- Session Hijacking Tools
Lesson 05- Countermeasures
Lesson 06- Penetration Testing
Module 12 – Evading IDS, Firewalls, and Honeypots
Lesson 01- IDS, Firewall, and Honeypot Concepts
Lesson 02- IDS, Firewall, and Honeypot Solutions
Lesson 03- Evading IDS
Lesson 04- Evading Firewalls
Lesson 05- IDS/Firewall Evading Tools
Lesson 06- Detecting Honeypots
Lesson 07- IDS/Firewall Evasion Countermeasures
Lesson 08- Penetration Testing
Module 13- Hacking Web Servers
Lesson 01- Web Server Concepts
Lesson 02- Web Server Attacks
Lesson 03- Web Server Attack Methodology
Lesson 04- Web Server Attack Tools
Lesson 05- Countermeasures
Lesson 06- Patch Management
Lesson 07- Web Server Security Tools
Lesson 08- Web Server Pen Testing
Module 14- Hacking Web Applications
Lesson 01 – Web App Concepts
Lesson 02 – Web App Threats
Lesson 03 – Hacking Methodology
Lesson 04 – Web Application Hacking Tools
Lesson 05 – Countermeasures
Lesson 06 – Web App Security Testing Tools
Lesson 07 – Web App Pen Testing
Module 15- SQL Injection
Lesson 01 – SQL Injection Concepts
Lesson 02 – Types of SQL Injection
Lesson 03 – SQL Injection Methodology
Lesson 04 – SQL Injection Tools
Lesson 05 – Evasion Techniques
Lesson 06 – Countermeasures
Module 16- Hacking Wireless Networks
Lesson 01 – Wireless Concepts
Lesson 02 – Wireless Encryption
Lesson 03 – Wireless Threats
Lesson 04 – Wireless Hacking Methodology
Lesson 05 – Wireless Hacking Tools
Lesson 06 – Bluetooth Hacking
Lesson 07 – Countermeasures
Lesson 08 – Wireless Security Tools
Lesson 09 – Wi-Fi Pen Testing
Module 17- Hacking Mobile Platforms
Lesson 01- Mobile Platform Attack Vectors
Lesson 02- Hacking Android OS
Lesson 03- Hacking iOS
Lesson 04- Mobile Spyware
Lesson 05- Mobile Device Management
Lesson 06- Mobile Security Guidelines and Tools
Lesson 07- Mobile Pen Testing
Module 18- IoT Hacking
Lesson 01- IoT Concepts
Lesson 02- IoT Attacks
Lesson 03- IoT Hacking Methodology
Lesson 04- IoT Hacking Tools
Lesson 05- Countermeasures
Lesson 06- IoT Pen Testing
Module 19- Cloud Computing
Lesson 01 – Cloud Computing Concepts
Lesson 02 – Cloud Computing Threats
Lesson 03 – Cloud Computing Attacks
Lesson 04 – Cloud Security
Lesson 05 – Cloud Security Tools
Lesson 06 – Cloud Penetration Testing
Module 20- Cryptography
Lesson 01- Cryptography Concepts
Lesson 02- Encryption Algorithms
Lesson 03- Cryptography Tools
Lesson 04- Public Key Infrastructure (PKI)
Lesson 05- Email Encryption
Lesson 06- Disk Encryption
Lesson 07- Cryptanalysis
Lesson 08- Countermeasures