Week 1 | Introduction to Ethical Hacking |
Week 2 | Reconnaissance and Information Gathering |
Week 3 | Scanning and Enumeration |
Week 4 | Vulnerability Assessment and Exploitation |
QUIZ 1 |
|
Week 5 | Web Application Security Testing: OWASP Top Ten, SQL Injection, XSS |
Week 6 | Network Penetration Testing: Exploiting Misconfigurations, Brute-Force Attacks |
Week 7 | Wireless Security Testing: WEP/WPA/WPA2 Cracking, Rogue Access Points |
Week 8 | Social Engineering Techniques and Countermeasures |
QUIZ 2 |
|
Week 9 | Post-Exploitation and Privilege Escalation |
Week 10 | Evading Detection: Anti-Forensics and Steganography |
Week 11 | Incident Response and Reporting |
Week 12 | Legal and Ethical Considerations in Ethical Hacking |
PROJECT REPORT |