The complete ethical hacking & penetration testing training is a comprehensive training course that creates the foundation of ethical hacking. If you want to get in the cyber security field (that you should), then this is an ideal course for you. It teaches you, how to find vulnerabilities (bugs or loopholes, like coding mistakes, configuration mistakes or errors etc) in any applications and Network infrastructures including networking devices, mobiles and etc. Web Application Penetration is specific to digging the same specific to web applications
Introduction to Ethical Hacking
- Legality and Ethics
- Networking & Basics
- Foot Printing
- Google Hacking
- Scanning
- Enumeration
- System Hacking
- Windows Hacking
- Trojans & Backdoors
- Virus & Worms
- Sniffers
- Social Engineering
- Proxy Server & Packet Filtering
- Denial of Service
- Social Engineering
- Phishing
- Denial of Service Attack
- Session Hijacking
Penetration Testing
- Vulnerability Assessment
- Linux Hacking
- Physical Security
- Hacking Webservers
- Web Application Vulnerabilities
- Web Based password Cracking Techniques
- SQL Injection Vulnerabilities
- Cryptography
- Wireless Network Hacking and Countermeasures
- Evading IDS, Firewalls and Detecting Honey Pots
- Buffer Overflows
- Reverse Engineering
- Hacking Database Servers
Advanced Topics
- Steganography
- Spying Technologies
- Hacking Routers and Firewalls
- Computer Forensics and Incident Handling
- Botnets
- Hacking emails
- Privacy on the Internet
- Creating Security Policies
- Exploit Writing
- Patch Management
- Covering Tracks