Curriculum
- 5 Sections
- 56 Lessons
- 24 Weeks
Expand all sectionsCollapse all sections
- Module 1: Introduction to Hacker's World18
- 1.1Hacker’s Interest Area
- 1.2TCP/IP Fundamentals
- 1.3System Fundamentals
- 1.4Basics of Linux
- 1.5Desktop & Server Security
- 1.6100% Anonymity – Being Anonymous on Internet
- 1.7Internet Security
- 1.8Scanning, Fingerprinting, and Information Gathering
- 1.9Technical Attacks & Password Cracking
- 1.10Virus, Worms and Trojans v What are Virus
- 1.11Malware Analysis
- 1.12Botnets and DDOS
- 1.13Reverse Engineering
- 1.14Mobile Hacking & Security/BYOD
- 1.15Cryptography, Steganography Introduction with
- 1.16Google Hacking
- 1.17EPS and DLP
- 1.18Server hardening
- Module 217
- 2.1Social Engineering
- 2.2Honeypot and Honeynets
- 2.3Firewall, IDS & IPS
- 2.4Network Scanning & vulnerabilities
- 2.5Application Security Architecture
- 2.6Database Security
- 2.7Secure Coding & Practices
- 2.8OWASP (Top Ten Web Vulnerabilities)
- 2.9OWASP Testing Framework
- 2.10VA/PT Frameworks
- 2.11OWASP Top Ten Mobile Application Vulnerabilities
- 2.12OWASP Top Ten API Vulnerabilities
- 2.13Vulnerability Assessment and Penetration Testing (VA/PT)
- 2.14VA/PT Tools
- 2.15VA/PT Report and Documentation Writing
- 2.16Kali Linux (Hackers Operating System)
- 2.17Metasploit
- Module 3: Professional Forensics Expert8
- Module 4: Professional IT Security Manager & Auditor8
- Module 5: A Corporate Level Efficiency Training for the Candidates5
TCP/IP Fundamentals
Next