Module 1: Introduction to Ethical Hacking and Cyber Security
Module 2: Private Hacking Lab Setup
Module 3: Introduction to Kali Linux (Hackers Delight)
Module 4: Vulnerability Assessment and Management
Module 5: Networking Fundamentals
Module 6: Information Gathering and Footprinting
Module 7: Port scanning techniques (TCP, UDP, stealth, etc.)
Module 8: Exploitation Techniques Part 1 (the fun Begins)
Module 9: Exploitation Techniques Part 2
Module 10: Backdoor Generation, Weaponization and Delivery Techniques
Module 11: Post Exploitation and Lateral Movement
Module 12: Web site Hacking Techniques
Module 13: Network and Wireless Security
Module 14: Social Engineering Attacks
Module 15: Cryptography Fundamentals
Module 16: Ethics and Responsible Disclosure
AfriSentinel Red: Uniting Africa for Cyber Resilience
As Africa accelerates its digital transformation, the importance of safeguarding its cyber landscape becomes paramount. In this dynamic era, where