9 Sections
25 Lessons
15 Hours
Expand all sections
Collapse all sections
Introduction to Ethical Hacking
3
1.1
What is ethical hacking?
1.2
Legal scope
1.3
Types of hackers
Setting Up a Safe Lab
3
2.1
VirtualBox basics
2.2
Kali Linux overview
2.3
Test environment setup
Reconnaissance & OSINT
3
3.1
Passive recon
3.2
Active recon
3.3
Footprinting tools
Network Scanning
3
4.1
Nmap basics
4.2
Port scanning
4.3
Service detection
Vulnerability Scanning
3
5.1
Common vulnerabilities
5.2
Basic tools
5.3
Simple analysis
Web Application Basics
3
6.1
HTTP/HTTPS
6.2
Simple test cases
6.3
Common flaws
Password & Authentication Security
3
7.1
Weak passwords
7.2
Brute-force basics
7.3
Prevention methods
Defense Techniques
3
8.1
Secure configurations
8.2
Protection practices
8.3
Basic incident response
Final Project
1
9.1
Perform a mini ethical-hacking test & write a report
Ethical Hacking Mini Bootcamp
Curriculum
This content is protected, please
login
and enroll in the course to view this content!
Home
Courses
Search
Search
Account
Login with your site account
Prove your humanity
8 + 1 =
Lost your password?
Remember Me
Modal title
Main Content