Course sections
Section 1
Module 01- Introduction to Ethical Hacking
1
Lesson 01 – Information Security Overview
2
Lesson 02 – Information Security Threats and Attack Vectors
3
Lesson 03 – Hacking Concepts
4
Lesson 04 – Ethical Hacking Concepts
5
Lesson 05 – Information Security Controls
6
Lesson 06 – Penetration Testing Concepts
7
Lesson 07 – Information Security Laws and Standards
Section 2
Module 02- Footprinting and Reconnaissance
1
Lesson 01 – Footprinting Concepts
2
Lesson 02 – Footprinting through Search Engines
3
Lesson 03 – Footprinting through Web Services
4
Lesson 04 – Footprinting through Social Networking Sites
5
Lesson 05 – Website Footprinting
6
Lesson 06- Email Footprinting
7
Lesson 07- Competitive Intelligence
8
Lesson 08- Whois Footprinting
9
Lesson 09- DNS Footprinting
10
Lesson 10- Network Footprinting
11
Lesson 11- Footprinting through Social Engineering
12
Lesson 12- Footprinting Tools
13
Lesson 13- Countermeasures
14
Lesson 14- Footprinting Pen Testing
Questions
My Question