Curriculum
- 4 Sections
- 31 Lessons
- 4 Weeks
Expand all sectionsCollapse all sections
- Week 1Introduction to Cybersecurity & Ethical Hacking5
- Week 2Scanning, Enumeration & Gaining Access8
- 2.0Network Scanning & Enumeration60 Minutes
- 2.1Understanding IPs, Ports, and Network Services
- 2.2Scanning with Nmap & Advanced Network Discovery
- 2.3Vulnerability Scanning with Nessus
- 2.4Password Cracking Techniques (Brute Force, Dictionary Attacks, etc.)
- 2.5Exploiting System Vulnerabilities (Windows & Linux)
- 2.6Privilege Escalation Techniques
- 2.7Covering Tracks & Maintaining Access
- Week 3Web & Wireless Hacking9
- 3.0Web Application Security & Hacking Techniques60 Minutes
- 3.1SQL Injection (SQLi) & Cross-Site Scripting (XSS)
- 3.2Cross-Site Request Forgery (CSRF) & Broken Authentication Attacks
- 3.3Web Application Firewalls & Security Measures
- 3.4Wireless Network Hacking & Security
- 3.5Wireless Encryption Standards (WEP, WPA, WPA2, WPA3)
- 3.6Wi-Fi Hacking & Packet Sniffing
- 3.7Rogue Access Points & Evil Twin Attacks
- 3.8Securing Wireless Networks
- Week 4Penetration Testing, Forensics & Incident Response9
- 4.0Penetration Testing Methodologies
- 4.1Black Box, White Box & Grey Box Testing
- 4.2Hands-on Penetration Testing Project
- 4.3Writing a Professional Penetration Testing Report
- 4.4Incident Response & Digital Forensics
- 4.5Cyber Incident Handling & Response Plan
- 4.6Log Analysis & Threat Hunting
- 4.7Digital Forensics & Evidence Collection
- 4.8Reporting & Legal Aspects of Cyber Investigations