Prerequisites

Before attending this course, students should have a good understanding of TCP/IP, DNS, and Windows Server.

Course Modules

  • 1. Introduction to Ethical Hacking and Legal Considerations
  • 2. Cryptography Overview
  • 3. Planning and Scoping
  • 4. Information Gathering
  • 5. Scanning and Enumeration Techniques
  • 6. Vunerability Scanning and Analysis
  • 7. System Attacks and Exploits
  • 8. Exploiting Wireless Networks
  • 9. Exploiting Application Vulnerabilities
  • 10. Post-Exploitation Tasks
  • 11. Tools Used To Perform Assessment
  • 12. Report Creation and Communication