2 Sections
39 Lessons
20 Weeks
Expand all sections
Collapse all sections
Introduction to Penetration Testing & Ethical Hacking
15
1.1
Information Security
1 Hour
1.2
Vulnerability
1 Hour
1.3
Vulnerability Assessment
1 Hour
1.4
Penetration Testing Process
1 Hour
1.5
Penetration Testing Methodologies
1 Hour
1.6
Types of Penetration Testing
1 Hour
1.7
Jump Box (Jump Server – Bastion Host)
1 Hour
1.8
Scope of Penetration Testing
1 Hour
1.9
NDA in Penetration Testing
1 Hour
1.10
Bug Bounty
1 Hour
1.11
Red Team (Offensive)
1 Hour
1.12
Classification of Security Threats
1 Hour
1.13
Common Vulnerability Scoring System (CVSS)
1 Hour
1.14
Vulnerability Management
1 Hour
1.15
Cyber Security Compliance
1 Hour
Reconnaissance (Footprinting)
24
2.1
Reconnaissance (Footprinting)
1 Hour
2.2
Website Reconnaissance
1 Hour
2.3
Waybackurls
1 Hour
2.4
Websites Built With
1 Hour
2.5
WHOIS Lookup
1 Hour
2.6
Content Delivery Network (CDN)
1 Hour
2.7
CDN Bypass – Techniques & Concepts
1 Hour
2.8
Domain Name to IP Address Lookup
1 Hour
2.9
IP Address to Location Lookup
1 Hour
2.10
IP Traceroute Tool
1 Hour
2.11
Reverse Name Server Lookup
1 Hour
2.12
SEO (Search Engine Optimization)
1 Hour
2.13
Google Keyword Types
1 Hour
2.14
Google Hacking Database (GHDB)
1 Hour
2.15
Google Search Advanced Operators
2.16
Google Dorks – Exploit Search Techniques
1 Hour
2.17
Google Dorks – Exploit Search Techniques – 2
1 Hour
2.18
Google Hacking Database (GHDB)
1 Hour
2.19
Shodan Recon
1 Hour
2.20
Shodan Filters Reference
1 Hour
2.21
Shodan Recon – Filters Reference- 2
1 Hour
2.22
Shodan CLI
1 Hour
2.23
FOFA Recon
1 Hour
2.24
GitHub Recon
1 Hour
Footprinting and Reconnaissance (December 2025)
Off
On
Search
Curriculum
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Modal title
Main Content