Course Content
Introduction to Security.
In this chapter, covered basics of cyber security and information security threats.
0/1
Introduction to Ethical Hacking
Here is described basics of hacking and ethical hacking.
0/1
Vulnerability
Here is described, Security teaming and basics of vulnerability.
0/1
Footprinting
Here is covered, basics of footprinting and footprinting hacking techniques.
0/1
Enumeration
Here is described, basics of enumeration and enumeration countermeasures.
0/1
Network Scanning
In this chapter, you will learn about basics of network scanning, network scanning tools and functions of network scanning.
0/1
System Hacking
In this chapter, you will learn about basics of system hacking, system hacking tools and functions.
0/1
Social Engineering
In this chapter, you will learn basics of social engineering, social engineering attack techniques, examples and prevention techniques.
0/1
Conclusion
Sum up of this course.
0/1
Final Assessment
You will get 15 question. attempt it.
0/1
Introduction to Ethical Hacking
About Lesson

Here is covered,

  • Basics of Foot printing.
  • Types of Foot printing.
  • Foot printing Hacking Techniques.
  • Prevention Techniques of foot printing.
Exercise Files
No Attachment Found
No Attachment Found