Module 1: Introduction to Ethical Hacking
Module 2: Hacking Lab Setup
Module 3: Networking Fundamentals
Module 4: Linux Basics for Ethical Hackers
Module 5: Information Gathering and Footprinting
Module 6: Scanning and Enumeration
Module 7: Vulnerability Assessment
Module 8: Web Application Security
Module 9: Exploitation Techniques - Part 1
Module 10: Exploitation Technique - Part 2
Module 11: Backdoor Generation, Weaponisation and Delivery
Module 12: Browser Exploitation
Module 13: Post-Exploitation and Lateral Movement
Module 14: Wireless Network Security
Module 15: Social Engineering and Physical Security
Module 16: Cryptography and Secure Communications
Module 17: Network Defense and Countermeasures
Module 18: Incident Response and Forensics
13.1. Incident Response Phases and Procedures
Incident response is a structured approach to handling and managing cybersecurity incidents in an organization. It involves identifying, responding to,
You are unauthorized to view this page.