Module 1: Introduction to Ethical Hacking
Module 2: Hacking Lab Setup
Module 3: Networking Fundamentals
Module 4: Linux Basics for Ethical Hackers
Module 5: Information Gathering and Footprinting
Module 6: Scanning and Enumeration
Module 7: Vulnerability Assessment
Module 8: Web Application Security
Module 9: Exploitation Techniques - Part 1
Module 10: Exploitation Technique - Part 2
Module 11: Backdoor Generation, Weaponisation and Delivery
Module 12: Browser Exploitation
Module 13: Post-Exploitation and Lateral Movement
Module 14: Wireless Network Security
Module 15: Social Engineering and Physical Security
Module 16: Cryptography and Secure Communications
Module 17: Network Defense and Countermeasures
Module 18: Incident Response and Forensics
3.2. Navigating the Linux File System and Basic File Operations
Navigating the Linux file system and performing basic file operations are essential skills for Linux users and system administrators. The
You are unauthorized to view this page.