Prerequisites
Before attending this course, students should have a good understanding of TCP/IP, DNS, and Windows Server.
Course Modules
- 1. Introduction to Ethical Hacking and Legal Considerations
- 2. Cryptography Overview
- 3. Planning and Scoping
- 4. Information Gathering
- 5. Scanning and Enumeration Techniques
- 6. Vunerability Scanning and Analysis
- 7. System Attacks and Exploits
- 8. Exploiting Wireless Networks
- 9. Exploiting Application Vulnerabilities
- 10. Post-Exploitation Tasks
- 11. Tools Used To Perform Assessment
- 12. Report Creation and Communication