Introduction to ethical hacking, including terminologies, vulnerabilities assessment, penetration testing and various laws related to hacking
What is Kali Linux as well as how to install it
How to crack passwords and different password attacks
Introduction to Network Scanning as well as learning about nmap, Nessus Vulnerability Scanner, and proxy chaining
Introduction to enumeration, and enumeration tools and techniques
Detailed introduction into system hacking and malware threats
Understanding Sniffing, as well as finding and changing MAC address
DOS Attacks, DOS attack mitigation Techniques, Techniques to Flood a network and type of dos attack and dos tools
Conduct Vulnerability Analysis
Different Hacking web applications and Pen tools
SQL Injection
About SQLmap Tool in Kali Linux
Social Engineering
Information Gathering
Database Assessment & Database Hacking Practicals
Section 1 : Introduction to Ethical Hacking
Section 2 : Installation of Kali linux
Section 3 : Password Cracking practicals
Section 4 : Scanning Networks
Section 5 : Enumeration
Section 6 : System hacking and Malware Threats
Section 7 : Sniffing
Section 8 : Dos Attack ( Denial Of Service Attack)
Section 9 : Vulnerability Analysis
Section 10 : Hacking Web Applications
Section 11 : SQL Injection
Section 12 : Social Engineering
Section 13 : Information Gathering
Section 14 : Database Assessment