Curriculum :
Introduction to Ethical Hacking
– Understanding Ethical Hacking and its Importance
– Differentiating Ethical Hacking from Malicious Hacking
– Legal and Ethical Considerations
– Overview of Common Cybersecurity Threats and Attack Vectors
– Introduction to Penetration Testing and Vulnerability Assessment
– Installing Linux, Linux Basics & File Permissions
Networking Fundamentals
– Basics of Computer Networks
– TCP/IP Fundamentals
– OSI Model and its Layers
– Understanding Network Protocols (e.g., HTTP, FTP, DNS)
– Network Scanning Techniques and Tools
Information Gathering and Footprinting
– Understanding Information Gathering Techniques
– Passive and Active Information Gathering
– Whois Lookup, DNS Enumeration, and Google Hacking
– Social Engineering Fundamentals
– Using Open Source Intelligence (OSINT) Tools
System Hacking
– Understanding System Architecture
– Exploiting System Vulnerabilities
– Password Cracking Techniques and Tools
– Privilege Escalation
– Malware Fundamentals and Countermeasures
Web Application Security
– Understanding Web Application Architecture
– Common Web Application Vulnerabilities (e.g., SQL Injection, Cross-Site Scripting)
– Web Application Scanning and Enumeration
– OWASP Top 10
– Web Application Penetration Testing Methodologies and Tools
Wireless Network Security and Ethical Hacking Project
– Wireless Networking Fundamentals
– Wireless Security Protocols (e.g., WEP, WPA, WPA2)
– Wireless Hacking Techniques (e.g., Packet Sniffing, Deauthentication Attacks)
Project