• Introduction to Ethical Hacking
• Lab Setup
• Kali Linux
• Foot Printing and Reconnaissance
• Scanning Networks
• Enumeration
• Vulnerability Analysis
• System Hacking
• Malware threats
Sniffing
• Social Engineering
• Denial-of-service
• Session Hijacking
• Hacking Web servers
• Hacking web Application
• SQL Injection
• Hacking Wireless Networks
• Hacking Mobile Platforms
• loT for hacking & OT platform
• Cloud Computing
• Cryptography
• Steganography
Evading IDS, Firewalls & Honeypots