Log in / Sign Up
  • Courses

    Popular Categories

    • Cybersecurity
    • Data Science
  • FAQ
  • ApplyForYou
  • Profile
    • Register
    • Login
  • Contact Us

Call us

+1 (484) 840 3308

NextGen Digital Academy
  • Courses

    Popular Categories

    • Cybersecurity
    • Data Science
  • FAQ
  • ApplyForYou
  • Profile
    • Register
    • Login
  • Contact Us
0

No products in the cart.

0

Ethical Hacking

Curriculum

  • 8 Sections
  • 40 Lessons
  • 8 Weeks
Expand all sectionsCollapse all sections
  • Module 1: Introduction to Ethical Hacking & Cyber Kill Chain
    6
    • 1.1
      Ethical Hacking vs. Malicious Hacking
    • 1.2
      Hacker Types & Motivations (White Hat, Black Hat, Gray Hat)
    • 1.3
      Legal and Ethical Considerations (Cyber Laws, Responsible Disclosure)
    • 1.4
      Cyber Kill Chain & MITRE ATT&CK Framework
    • 1.5
      Penetration Testing Methodologies (Black Box, White Box, Gray Box)
    • 1.6
      Hands-on Labs: Setting up a penetration testing environment using Kali Linux & Virtual Machines
  • Module 2: Reconnaissance & Footprinting
    8
    • 2.1
      Passive vs. Active Reconnaissance
    • 2.2
      Open Source Intelligence (OSINT) Techniques
    • 2.3
      WHOIS Lookups, DNS Enumeration, Google Dorking
    • 2.4
      Social Engineering & Phishing Attacks
    • 2.5
      Scanning Networks & Enumerating Services
    • 2.6
      Vulnerability Management (Scanning, Patching, CVE Identification)
    • 2.7
      Hands-on Labs: Using OSINT tools for reconnaissance
    • 2.8
      Hands-on Labs: Scanning networks with Nmap and Shodan
  • Module 3: Exploitation & System Hacking
    6
    • 3.1
      Common Exploitation Techniques (Buffer Overflows, Privilege Escalation)
    • 3.2
      Gaining Access (Brute-Force Attacks, Credential Harvesting, Exploit Kits)
    • 3.3
      Exploiting Web Applications (SQL Injection, XSS, CSRF)
    • 3.4
      Exploiting Network Protocols (Man-in-the-Middle, ARP Spoofing, SMB Exploits)
    • 3.5
      Hands-on Labs: Exploiting a vulnerable machine using Metasploit
    • 3.6
      Hands-on Labs: Performing SQL injection and XSS attacks
  • Module 4: Post-Exploitation & Persistence
    6
    • 4.1
      Maintaining Access (Rootkits, Backdoors, Persistence Mechanisms)
    • 4.2
      Credential Dumping & Privilege Escalation
    • 4.3
      Lateral Movement Techniques (Pass-the-Hash, Remote Code Execution)
    • 4.4
      Data Exfiltration & Evasion Techniques
    • 4.5
      Hands-on Labs: Dumping credentials and privilege escalation
    • 4.6
      Hands-on Labs: Simulating a post-exploitation attack
  • Module 5: Wireless & Cloud Security Attacks
    4
    • 5.1
      Wireless Hacking Fundamentals (Wi-Fi Encryption Standards, WPA Cracking)
    • 5.2
      Rogue Access Points & Evil Twin Attacks
    • 5.3
      Attacking Cloud-Based Environments
    • 5.4
      Hands-on Labs: Capturing and cracking Wi-Fi handshakes
  • Module 6: Incident Response & Countermeasures
    3
    • 6.1
      Threat Hunting & Incident Response (Detection, Containment, Recovery)
    • 6.2
      Security Hardening Techniques & Patching Vulnerabilities
    • 6.3
      Hands-on Labs: Detecting and mitigating cyber-attacks using SIEM tools
  • Module 7: Ethical Hacking Certification Exam Review & Mock Exams
    3
    • 7.1
      Ethical Hacking Certification Exam Structure & Question Format
    • 7.2
      Practice Questions & Answer Explanations
    • 7.3
      Full-Length Mock Exam & Review Session
  • Add-ons: Job Placement Assistance
    4
    • 8.1
      20 job applications
    • 8.3
      Mock interviews
    • 8.4
      Resume & LinkedIn optimization
    • 8.5
      Personal website & portfolio
This content is protected, please login and enroll in the course to view this content!
Credential Dumping & Privilege Escalation
Prev
Data Exfiltration & Evasion Techniques
Next

ABOUT

  • About
  • Contact
  • Refund
  • Privacy Policy

Courses

  • Cybersecurity
  • Data Science

© 2024 NGDA. All Right Reserved.

  • Courses
  • Privacy Policy
  • About
  • Refund Policy
  • FAQ