MODULES
Module 0 – Course Introduction
Module 1 – Introduction to Ethical Hacking
Module 2 – Linux Fundamentals
Module 3 – Protocols
Module 4 – Cryptography
Module 5 – Password Cracking
Module 6 – Malware
Module 7 – Security Devices
Module 8 – Information Gathering – Passive Reconnaissance
Module 9 – Social Engineering
Module 10 – Active Reconnaissance
Module 11 – Vulnerability Assessment
Module 12 – Network Attacks
Module 13 – Hacking Servers
Module 14 – Hacking Web Technologies
Module 15 – Hacking Wireless Technologies
Module 16 – Maintaining Access and Covering Tracks
LABS
Module 1 – Introduction to the C)PEH Setup
Module 2 – Linux Fundamentals
Module 3 – Understanding Protocols
Module 4 – Cryptography
Module 5 – Password Cracking
Module 6 – Malware
Module 7 – Information Gathering
Module 8 – Information Gathering – Active Reconnaissance
Module 9 – Vulnerability Assessment
Module 10 – Network Sniffing/IDS
Module 11 – Windows Hacking
Module 12 – Attacking Databases
Module 13 – Attacking Web Applications
Module 14 – Backdoors Accreditations
Reviews
There are no reviews yet.