Curriculum
- 4 Sections
- 31 Lessons
- 4 Weeks
Expand all sectionsCollapse all sections
- Week 1Introduction to Cybersecurity & Ethical Hacking5
- Week 2Scanning, Enumeration & Gaining Access8
- 2.1Network Scanning & Enumeration60 Minutes
- 2.2Understanding IPs, Ports, and Network Services
- 2.3Scanning with Nmap & Advanced Network Discovery
- 2.4Vulnerability Scanning with Nessus
- 2.5Password Cracking Techniques (Brute Force, Dictionary Attacks, etc.)
- 2.6Exploiting System Vulnerabilities (Windows & Linux)
- 2.7Privilege Escalation Techniques
- 2.8Covering Tracks & Maintaining Access
- Week 3Web & Wireless Hacking9
- 3.1Web Application Security & Hacking Techniques60 Minutes
- 3.2SQL Injection (SQLi) & Cross-Site Scripting (XSS)
- 3.3Cross-Site Request Forgery (CSRF) & Broken Authentication Attacks
- 3.4Web Application Firewalls & Security Measures
- 3.5Wireless Network Hacking & Security
- 3.6Wireless Encryption Standards (WEP, WPA, WPA2, WPA3)
- 3.7Wi-Fi Hacking & Packet Sniffing
- 3.8Rogue Access Points & Evil Twin Attacks
- 3.9Securing Wireless Networks
- Week 4Penetration Testing, Forensics & Incident Response9
- 4.1Penetration Testing Methodologies
- 4.2Black Box, White Box & Grey Box Testing
- 4.3Hands-on Penetration Testing Project
- 4.4Writing a Professional Penetration Testing Report
- 4.5Incident Response & Digital Forensics
- 4.6Cyber Incident Handling & Response Plan
- 4.7Log Analysis & Threat Hunting
- 4.8Digital Forensics & Evidence Collection
- 4.9Reporting & Legal Aspects of Cyber Investigations