Course Content

Section 1: Introduction

Section 2: Downloading & Installing VM

Section 3: Enabling Virtualization Technology (VTx) in Computer or Laptop

Section 5: Setting up Repository & User in Kali Linux

Section 6: Introduction to Ethical Hacking & CEH Modules

Section 7: Foot-printing & Reconnaissance

Section 8: Scanning Networks

Section 9: Enumeration

Section 10: Vulnerability Analysis

Section 11: System Hacking

Section 12: Malware Threats

Section 13: Sniffing

Section 14: Social Engineering

Section 15: Denial-of-Service (DOS & DDOS)

Section 16: Session Hijacking

Section 17: Evading IDS, Firewalls & Honeypots

Section 18: Hacking Web Servers

Section 19: Hacking Web Applications

Section 20: SQL Injection

Section 21: Hacking Wireless (Wifi) Neworks

Section 22: Hacking Mobile Platforms

Section 23: IoT Hacking

Section 24: Cloud Computing

Section 25: Cryptography

Section 26: Continue Your Search in Hacking

Eaxm