Example Curriculum
Available in
days
days
after you enroll
- 1. Introduction To Ethical Hacking (91:08)
- 1. Notes for Basics of Ethical Hacking
- 2. Notes for Basics of Ethical Hacking
- 3. Notes for Basics of Ethical Hacking
- 1.2 Introduction to Ethical hacking - part 2, basics of networking part 1 (129:43)
- 1.3 Basics of networking - part 2 (100:08)
- 1.4 Basics of networking part 3 (59:47)
- 1.5 Basics of Networking part 4 (120:49)
- 4. Notes for Basics of Networking
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 4.1 VPN, Footprinting part 1 - 16 Sept'20 (116:02)
- 4.2 Footprinting part 2, Scanning part 1 - 17 Sept'20 (123:02)
- 4.3 Scanning part 2 - 18 Sept'20 (117:54)
- 1. Notes for Footprinting
- 2. Notes for Footprinting
- 3. Notes for Footprinting
- 4. Notes for Footprinting
- 5. Notes for Scanning
- 6. Notes for Scanning
- 7. Nmap Cheat sheet
- Footprinting Assignment
- Scanning Assignment
Available in
days
days
after you enroll
- 5.1 Enumeration, System Hacking part 1 (Password cracking)- 21 Sept'20 (111:34)
- 5.2 System Hacking part 2 - 22 Sept'20 (125:13)
- 5.3 System Hacking part 3 - 23 Sept'20 (132:57)
- 1. Notes for Enumeration
- 2. Notes for Enumeration
- 3. Notes for Enumeration
- 4. Notes for system hacking
- 5. Notes for system hacking
- 6. Notes for system hacking
- 7. Notes for system hacking
- Assignment for Enumeration
- Assignment for System Hacking
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 14.1 Firewall, IDS/IPS, Credit card fraud - 19 oct'20 (82:23)
- 14.2 IOT, Cloud Computing, cryptography - 20 oct'20
- 1. Notes for firewall, IDS/IPS
- 2. Notes for firewall, IDS/IPS
- 3. Notes for firewall, IDS/IPS
- 4. Notes for firewall, IDS/IPS
- 5. Notes for credit card fraud
- 6. Notes for IOT
- 7. Notes for Cloud Computing
- 8. Notes for cryptography
- 9. Notes for cryptography
- 10 Referal book for cryptography