• Footprinting and Reconnaissance Techniques
  • Network Reconnaissance Techniques
  • Enumeration Reconnaissance Techniques
  • Vulnerability Analysis Tools & Techniques
  • System Hacking Methodologies
  • Malware Threat Concepts
  • Network Sniffing Techniques
  • Social Engineering Exploits
  • Denial of Service Attacks
  • Session Hijacking Concepts
  • Compromising Web Servers
  • Web Application Hacking
  • SQL Injection Methodologies
  • Introduction to Cloud Computing
  • Cryptography Techniques