The following topics would be covered:
- Ethical Hacking - Introduction
- Footprinting & OSINT
- Scanning
- Enumeration
- Vulnerability Assessment
- System Hacking
- Malware Threats & Social Engineering
- Phishing attacks
- Sniffing
- Denial of Service
- Exploiting vulnerabilities using metasploit
- OWASP Top 10
- Hacking Web servers & Web Applications
- SQL Injection attacks
- Man-in-the-middle attacks
- Hacking Wireless networks
- Evading IDS & Firewalls
- Cryptography
- Cloud Computing
- CTF -1 Challenge & walkthrough