Log in / Sign Up
  • Courses

    Popular Categories

    • Cybersecurity
    • Data Science
  • FAQ
  • ApplyForYou
  • Profile
    • Register
    • Login
  • Contact Us

Call us

+1 (484) 840 3308

NextGen Digital Academy
  • Courses

    Popular Categories

    • Cybersecurity
    • Data Science
  • FAQ
  • ApplyForYou
  • Profile
    • Register
    • Login
  • Contact Us
0

No products in the cart.

0

Ethical Hacking

Curriculum

  • 8 Sections
  • 40 Lessons
  • 8 Weeks
Expand all sectionsCollapse all sections
  • Module 1: Introduction to Ethical Hacking & Cyber Kill Chain
    6
    • 1.1
      Ethical Hacking vs. Malicious Hacking
    • 1.2
      Hacker Types & Motivations (White Hat, Black Hat, Gray Hat)
    • 1.3
      Legal and Ethical Considerations (Cyber Laws, Responsible Disclosure)
    • 1.4
      Cyber Kill Chain & MITRE ATT&CK Framework
    • 1.5
      Penetration Testing Methodologies (Black Box, White Box, Gray Box)
    • 1.6
      Hands-on Labs: Setting up a penetration testing environment using Kali Linux & Virtual Machines
  • Module 2: Reconnaissance & Footprinting
    8
    • 2.1
      Passive vs. Active Reconnaissance
    • 2.2
      Open Source Intelligence (OSINT) Techniques
    • 2.3
      WHOIS Lookups, DNS Enumeration, Google Dorking
    • 2.4
      Social Engineering & Phishing Attacks
    • 2.5
      Scanning Networks & Enumerating Services
    • 2.6
      Vulnerability Management (Scanning, Patching, CVE Identification)
    • 2.7
      Hands-on Labs: Using OSINT tools for reconnaissance
    • 2.8
      Hands-on Labs: Scanning networks with Nmap and Shodan
  • Module 3: Exploitation & System Hacking
    6
    • 3.1
      Common Exploitation Techniques (Buffer Overflows, Privilege Escalation)
    • 3.2
      Gaining Access (Brute-Force Attacks, Credential Harvesting, Exploit Kits)
    • 3.3
      Exploiting Web Applications (SQL Injection, XSS, CSRF)
    • 3.4
      Exploiting Network Protocols (Man-in-the-Middle, ARP Spoofing, SMB Exploits)
    • 3.5
      Hands-on Labs: Exploiting a vulnerable machine using Metasploit
    • 3.6
      Hands-on Labs: Performing SQL injection and XSS attacks
  • Module 4: Post-Exploitation & Persistence
    6
    • 4.1
      Maintaining Access (Rootkits, Backdoors, Persistence Mechanisms)
    • 4.2
      Credential Dumping & Privilege Escalation
    • 4.3
      Lateral Movement Techniques (Pass-the-Hash, Remote Code Execution)
    • 4.4
      Data Exfiltration & Evasion Techniques
    • 4.5
      Hands-on Labs: Dumping credentials and privilege escalation
    • 4.6
      Hands-on Labs: Simulating a post-exploitation attack
  • Module 5: Wireless & Cloud Security Attacks
    4
    • 5.1
      Wireless Hacking Fundamentals (Wi-Fi Encryption Standards, WPA Cracking)
    • 5.2
      Rogue Access Points & Evil Twin Attacks
    • 5.3
      Attacking Cloud-Based Environments
    • 5.4
      Hands-on Labs: Capturing and cracking Wi-Fi handshakes
  • Module 6: Incident Response & Countermeasures
    3
    • 6.1
      Threat Hunting & Incident Response (Detection, Containment, Recovery)
    • 6.2
      Security Hardening Techniques & Patching Vulnerabilities
    • 6.3
      Hands-on Labs: Detecting and mitigating cyber-attacks using SIEM tools
  • Module 7: Ethical Hacking Certification Exam Review & Mock Exams
    3
    • 7.1
      Ethical Hacking Certification Exam Structure & Question Format
    • 7.2
      Practice Questions & Answer Explanations
    • 7.3
      Full-Length Mock Exam & Review Session
  • Add-ons: Job Placement Assistance
    4
    • 8.1
      20 job applications
    • 8.3
      Mock interviews
    • 8.4
      Resume & LinkedIn optimization
    • 8.5
      Personal website & portfolio
This content is protected, please login and enroll in the course to view this content!
Legal and Ethical Considerations (Cyber Laws, Responsible Disclosure)
Prev
Penetration Testing Methodologies (Black Box, White Box, Gray Box)
Next

ABOUT

  • About
  • Contact
  • Refund
  • Privacy Policy

Courses

  • Cybersecurity
  • Data Science

© 2024 NGDA. All Right Reserved.

  • Courses
  • Privacy Policy
  • About
  • Refund Policy
  • FAQ