Module 1: Introduction to Ethical Hacking and Cybersecurity
Module 2: Private Hacking Lab Setup
Module 3: Introduction to Kali Linux (Hackers Delight)
Module 4: Vulnerability Assessment
Module 5: Networking Fundamentals
Module 6: Information Gathering and Footprinting
Module 7: Exploitation Basics
Module 8: Exploitation Techniques with Metasploit
Module 9: Backdoor Generation, Weaponization & Delivery
Module 10: Post-Exploitation Techniques
Module 11: Web Application Exploitation
Module 12: Network Exploitation Basics
Module 13: Advanced Metasploit Features
Module 14: Course Conclusion and Next Steps
Setting up our Attacking Machine (Kali Linux)
Now that our virtualization software is ready, it is about time we start building our home lab from the ground
You are unauthorized to view this page.