Ethical Hacking Course Index
Learn ethical hacking from fundamentals to real-world attack techniques. This course covers reconnaissance, scanning, exploitation, web attacks, and hands-on ethical hacking practices aligned with industry standards.
I. Foundations & Hacking Mindset (10 Lessons)
1. What is Ethical Hacking
2. Hacker Types and Attack Motivations
3. Legal and Ethical Considerations
4. Hacking Methodologies Overview
5. Cyber Kill Chain
6. Footprinting and Reconnaissance Basics
7. Passive vs Active Reconnaissance
8. Information Gathering Tools Overview
9. Setting Up Hacking Lab
10. Kali Linux Overview
II. Reconnaissance & Scanning (10 Lessons)
III. System & Network Attacks (15 Lessons)
21. Password Cracking Basics
22. Brute Force Attacks
23. Credential Harvesting
24. Exploiting Misconfigurations
25. Linux System Attacks
26. Windows System Attacks
27. Privilege Escalation Basics
28. Malware Concepts Overview
29. Backdoors and Trojans
30. Network Sniffing Attacks
31. Man-in-the-Middle Attacks
32. Denial of Service Attacks
33. Wireless Network Attacks
34. Covering Tracks
35. Attack Mitigation Basics