Ethical Hacking and Countermeasure Certification
- Introduction of Ethical Hacking
- Foot-printing Active
- Foot-printing Passive
- In-depth Network Scanning
- Enumeration User Identification
- System Hacking Password Cracking & Bypassing
- Viruses and Worms
- Trojans and Backdoor
- Bots and Botnets
- Sniffers MITM with Kali
- Sniffers MITM with Windowsg
- Social Engineering Techniques Theoretical Approach
- Social Engineering Toolkit Practical Based Approach
- Denial of Service DOS & DDOS Attacks
- Web Session Hijacking
- SQL Injection Manual Testing
- SQL Injection Automated Tool Based Testing
- Basics of Web App Security
- Hacking Web servers Server Rooting
- Hacking Wireless Networks Manual CLI Based
- Hacking Wireless Network Automated Tool Based
- Evading IDS, Firewalls
- Honey pots
- Buffer Overflow
- Cryptography
- Penetration Testing: Basics
- Mobile Hacking
- Cloud Security and many more