Course Outline

  • Module 1: Introduction to Ethical Hacking
  • Module 2: Footprinting and Reconnaissance
  • Module 3: Scanning Networks
  • Module 4: Vulnerability Analysis
  • Module 5: System Hacking
  • Module 6: Malware Threats
  • Module 7: Sniffing
  • Module 8: Social Engineering
  • Module 9: Web Application Security
  • Module 10: Hacking Wireless Networks
  • Module 11: IoT and Cloud Security

Labs

  • Lab 1: Using OSINT Tools for Information Gathering
  • Lab 2: Advanced Google Hacking Techniques
  • Lab 3: Network Scanning and OS Fingerprinting with Nmap
  • Lab 4: Conducting Vulnerability Scanning and Assessment
  • Lab 5: Exploit Research and Proof-of-Concept (PoC) Creation
  • Lab 6: Password Cracking and Privilege Escalation Techniques
  • Lab 7: Malware Analysis Using Cuckoo Sandbox
  • Lab 8: Bypassing Anti-Virus Detection Techniques
  • Lab 9: Packet Sniffing and Network Analysis with Wireshark
  • Lab 10: Phishing Attacks Using Social Engineering Toolkit (SET)
  • Lab 11: Exploiting Web Application Vulnerabilities
  • Lab 12: Wireless Network Cracking with Aircrack-ng
  • Lab 13: Exploiting IoT Devices and Cloud Environments
  • Lab 14: Final Capture the Flag (CTF) Challenge

Certified Ethical Hacker, CEH, and EC-Council are registered trademarks of International Council of E-Commerce Consultants DBA EC-Council. All Boson products sold on this site are independently developed and are not affiliated with, nor have been sponsored or approved by EC-Council. All third party trademarks and/or registered trademarks referenced are the property of their respective owners.