
Certified Ethical Hacker
Curriculum
-
Module 01: Ethical Hacking: An Introduction (10Hours)
-
Module 02: Basics of Reconnaissance and Footprinting(15 Hours)
-
Concepts of Footprinting
-
Footprinting Using Search Engines
-
Footprinting Using Web Services
-
Footprinting Using Social Networking Sites
-
Footprinting of Websites
-
Footprinting of Emails
-
Competitive Intelligence
-
Footprinting using Whois
-
DNS Footprinting
-
Network Footprinting
-
Footprinting by Social Engineering
-
Tools used for Footprinting
-
Countermeasures
-
Module 03: Network Scanning(15Hours)
-
Module 04: Basics of Enumeration(10 Hours)
-
Module 05: Vulnerability Analysis(10Hours)
-
Module 06: basics of System Hacking(15Hours)
-
Module 07: Threats from Malware(15 Hours)
-
Module 08: Basics of Sniffing(15Hours)
-
Module 09: Social Engineering(15 Hours)
-
Module 10: Denial-of-Service Attack(10Hours)
-
Module 11: Session Hijacking(15 Hours)
-
Module 12: How to Evade IDS, Firewalls, and Honeypots(10 Hours)
-
Module 13: Basics of Hacking Web Servers(10 Hours)
-
Module 14: Web Application Hacking(10 Hours)
-
Module 15: Basics of SQL Injection(15 Hours)
-
Module 16: Wireless Network Hacking(10 Hours)
-
Module 17: Hacking Mobile Platforms(15 Hours)
-
Module 18: Basics of IoT Hacking (10 Hours)
-
Module 19: Basics of Cloud Computing(10 Hours)
-
Module 20: Basics of Cryptography(5 Hours)
-
Network Fundamentals (15Hours)
-
Linux Course Curriculum (40 Hours)
-
Module 01: Ethical Hacking: An Introduction (10Hours)
-
Module 02: Basics of Reconnaissance and Footprinting(15 Hours)
- Concepts of Footprinting
- Footprinting Using Search Engines
- Footprinting Using Web Services
- Footprinting Using Social Networking Sites
- Footprinting of Websites
- Footprinting of Emails
- Competitive Intelligence
- Footprinting using Whois
- DNS Footprinting
- Network Footprinting
- Footprinting by Social Engineering
- Tools used for Footprinting
- Countermeasures
-
Module 03: Network Scanning(15Hours)
-
Module 04: Basics of Enumeration(10 Hours)
-
Module 05: Vulnerability Analysis(10Hours)
-
Module 06: basics of System Hacking(15Hours)
-
Module 07: Threats from Malware(15 Hours)
-
Module 08: Basics of Sniffing(15Hours)
-
Module 09: Social Engineering(15 Hours)
-
Module 10: Denial-of-Service Attack(10Hours)
-
Module 11: Session Hijacking(15 Hours)
-
Module 12: How to Evade IDS, Firewalls, and Honeypots(10 Hours)
-
Module 13: Basics of Hacking Web Servers(10 Hours)
-
Module 14: Web Application Hacking(10 Hours)
-
Module 15: Basics of SQL Injection(15 Hours)
-
Module 16: Wireless Network Hacking(10 Hours)
-
Module 17: Hacking Mobile Platforms(15 Hours)
-
Module 18: Basics of IoT Hacking (10 Hours)
-
Module 19: Basics of Cloud Computing(10 Hours)
-
Module 20: Basics of Cryptography(5 Hours)
-
Network Fundamentals (15Hours)
-
Linux Course Curriculum (40 Hours)