Module 1: Introduction to Ethical Hacking and Cybersecurity
Module 2: Private Hacking Lab Setup
Module 3: Introduction to Kali Linux (Hackers Delight)
Module 4: Vulnerability Assessment
Module 5: Networking Fundamentals
Module 6: Information Gathering and Footprinting
Module 7: Exploitation Basics
Module 8: Exploitation Techniques with Metasploit
Module 9: Backdoor Generation, Weaponization & Delivery
Module 10: Post-Exploitation Techniques
Module 11: Web Application Exploitation
Module 12: Network Exploitation Basics
Module 13: Advanced Metasploit Features
Module 14: Course Conclusion and Next Steps
Active Information Gathering with Tools
Active information gathering involves actively querying or probing the target system or network to gather information. While active techniques are
You are unauthorized to view this page.