Module 1: Introduction to Ethical Hacking and Cyber Security
Module 2: Private Hacking Lab Setup
Module 3: Introduction to Kali Linux (Hackers Delight)
Module 4: Vulnerability Assessment and Management
Module 5: Networking Fundamentals
Module 6: Information Gathering and Footprinting
Module 7: Port scanning techniques (TCP, UDP, stealth, etc.)
Module 8: Exploitation Techniques Part 1 (the fun Begins)
Module 9: Exploitation Techniques Part 2
Module 10: Backdoor Generation, Weaponization and Delivery Techniques
Module 11: Post Exploitation and Lateral Movement
Module 12: Web site Hacking Techniques
Module 13: Network and Wireless Security
Module 14: Social Engineering Attacks
Module 15: Cryptography Fundamentals
Module 16: Ethics and Responsible Disclosure
Join the Campaign for Cybersecurity Awareness in Africa
In today's interconnected world, cybersecurity is of utmost importance to safeguard individuals, organizations, and nations from the rising tide of