Session 1: Need for Ethical Hacking. Why we require Ethical Hackers? Types of Hackers. Steps in Ethical Hacking.
Session 2: Information gathering. Footprinting. Scanning. Enumeration. Social Engineering and attacks. Facebook , G mail , Instagram Hacking
Session 3: DOS and DDOS Attack. Session hijacking. Steganography. Cryptography. Key logger(Hack Any SYSTEM)
Session 4: What is hardware hacking and how it is done? The need for hardware hacking. Devices used in hardware hacking. USB rubber ducky and WIFI deauthentication practical.
Session 5: A man-in-the-middle attack, Evil Twin attack. Malware, trojan and viruses. Phishing. Practical on Windows hacking. How to protect yourself against attacks?