Ethical Hacking
I. Foundations & Hacking Mindset
1. What is Ethical Hacking
2. Hacker Types & Motivations
3. Legal & Ethical Considerations
4. Hacking Methodologies
5. Cyber Kill Chain
6. Footprinting & Reconnaissance
7. Passive vs Active Recon
8. Information Gathering Tools
9. Hacking Lab Setup
10. Kali Linux Overview
II. Reconnaissance & Scanning
11. DNS Enumeration
12. Whois & Network Enumeration
13. Google Dorking
14. Nmap Scanning
15. Port Scanning
16. Service Enumeration
17. Vulnerability Scanning
18. Nessus & OpenVAS
19. Banner Grabbing
20. Recon Best Practices
III. System & Network Attacks
21. Password Cracking
22. Brute Force Attacks
23. Credential Harvesting
24. Exploiting Misconfigurations
25. Linux System Attacks
26. Windows System Attacks
27. Privilege Escalation
28. Malware Concepts
29. Backdoors & Trojans
30. Network Sniffing
31. MITM Attacks
32. DoS Attacks
33. Wireless Attacks
34. Covering Tracks
35. Attack Mitigation
IV. Web Hacking & Real World