Day 1: Fundamentals of Ethical Hacking
Use Case 1: Introduction to Ethical Hacking
Use case 2: Fingerprinting and Reconnaissance Techniques
Use case 3: Network Analysis
Day 2: Vulnerability Identification and Analysis
Use case 4: Enumeration Techniques
Use case 5: Vulnerability Analysis
Use case 6: System Hacking
Day 3: Threats and Protection Techniques
Use case 7: Malware Threats
Use case 8: Packet Sniffing
Use case 9: Social Engineering
Day 4: Attacks and Countermeasures
Use case 10: Denial-of-Service Attacks
Use case 11: Session Hijacking
Use case 12: Bypassing IDS, Firewalls, and Honeypots
Day 5: Hacking Advanced and Security
Use case 13: Hacking Web Servers
Use case 14: Hacking Web Applications
Use case 15: SQL Injection
Use case 16: Wireless Network Security
Use case 17: Hacking Mobile Devices
Use case 18: Hacking IoT and OT
Use case 19: Cloud Computing Security
Use case 20: Cryptography
There are no items in the curriculum yet.