Module 1: Introduction to Ethical Hacking
Module 2: Hacking Lab Setup
Module 3: Networking Fundamentals
Module 4: Linux Basics for Ethical Hackers
Module 5: Information Gathering and Footprinting
Module 6: Scanning and Enumeration
Module 7: Vulnerability Assessment
Module 8: Web Application Security
Module 9: Exploitation Techniques - Part 1
Module 10: Exploitation Technique - Part 2
Module 11: Backdoor Generation, Weaponisation and Delivery
Module 12: Browser Exploitation
Module 13: Post-Exploitation and Lateral Movement
Module 14: Wireless Network Security
Module 15: Social Engineering and Physical Security
Module 16: Cryptography and Secure Communications
Module 17: Network Defense and Countermeasures
Module 18: Incident Response and Forensics
13.2. Digital Forensics Tools and Techniques for Evidence Collection
Digital forensics is the process of collecting, preserving, analyzing, and presenting digital evidence in a way that maintains its integrity
You are unauthorized to view this page.