SYLLABUS

🔹 Month 1: Foundations & Core Attacks

  1. Introduction to Ethical Hacking

  2. Footprinting and Reconnaissance

  3. Scanning Networks

  4. Enumeration

  5. Vulnerability Analysis

  6. System Hacking

  7. Malware Threats

  8. Sniffing

🔹 Month 2: Attacks on Networks, Systems & Web

  1. Social Engineering

  2. Denial-of-Service (DoS/DDoS)

  3. Session Hijacking

  4. Evading IDS, Firewalls, and Honeypots

  5. Hacking Web Servers

  6. Hacking Web Applications

  7. SQL Injection

🔹 Month 3: Wireless, Mobile, Cloud, and Emerging Threats

  1. Hacking Wireless Networks

  2. Hacking Mobile Platforms

  3. IoT and OT Hacking

  4. Cloud Computing

  5. Cryptography