This course covers ethical hacking fundamentals, from reconnaissance to advanced attacks like SQL injection and wireless hacking.Ideal for cybersecurity beginners.

Beginner to Advanced
Pass Final Exam
High Growth Potential
This course covers ethical hacking fundamentals, from reconnaissance to advanced attacks like SQL injection and wireless hacking.Ideal for cybersecurity beginners.
Fundamentals of ethical hacking penetration testing.
Tools like Nmap Wireshark Metasploit.
Secure protect systems from attacks.
Perform vulnerability assessments exploits.
Hack defend network web attacks.
Cybersecurity principles like encryption cloud security.
Handle malware social engineering threats.
Implement IDS firewalls honeypots.
Mobile IoT hacking techniques.
Cryptography and evasion methods.
Join thousands of successful students
Get expert guidance from our dedicated support team.
1. Introduction to the Course
2. Downloading Installing VMWare Software
Assessment Exercise- 01
3. Enabling Virtualization Technology (VTx)
4. Installing Kali Linux on VMWare
Assessment Exercise- 02
5. Setting up Repository User in Kali Linux Lecture
6. Introduction to Ethical Hacking (1)
7. Footprinting and Reconnaissance
8. Information Gathering
Assessment Exercise- 03
9. How to Scan Network (Nmap)
10. Nmap Network Scanning Demo
Assessment Exercise- 04
11. What is Enumeration
12. SpiderFoot OSINT
13. Real Time Virtual Machines Enumeration
Assessment Exercise- 05
15. Vulnerability Analysis Nikto Scanner
16. Nexpose InsightVM
Assessment Exercise- 06
17. Windows System Hacking
18. Android System Hacking
19. Linux System Hacking Create Malware or Payload
Assessment Exercise- 07
20. Malware Threats
21. AhMyth FAT Rat
Assessment Exercise- 08
22. Sniffing
23. WireShark Ettercap
24. Paessler PRTG Savvius Omnipeek
Assessment Exercise- 09
25. Social Engineering
26. How Social Engineering Works
Assessment Exercise- 10
27. DDos Using LOIC ZDoser
28. SlowLoris DOS Attack
29. DOS attack on live website using SlowLoris with Mobile using Termux Python
Assessment Exercise- 11
30. Session Hijacking Cookies Stealing
31. Session Hijacking Cookies Stealing Practical
Assessment Exercise- 12
32. Evading IDS Firewalls and Honeypots
33. Hacking Web Servers
34. Hacking Web Servers Practice CTFs HackTheBox
Assessment Exercise- 13
35. Hacking Web Applications
36. DVWA WebGoat
37. XSS Reflected Attack Demonstration on DVWA Online Website
Assessment Exercise- 14
38. SQL Injection
39. SQL Injection Practical Admin Panel Bypass
Assessment Exercise- 15
41. WPA WPA2 Security
42. WiFi Hacking with Aircrack-ng Capturing Handshake
43. Cracking with John The Ripper Linset on WifiSlax
44. WiFi Password Cracking Using Aircrack-ng John The Ripper Hashcat
Assessment Exercise- 16
45. Hacking Mobile Platforms Android Linux-Based
46. Evil Droid Auto Payload Generator
47. Bypass Play Protect
Assessment Exercise- 17
48. IoT Hacking
49. IoT Hacking Practical
Assessment Exercise- 18
50. Cloud Computing
51. VPS Practical
Assessment Exercise- 19
52. Cryptography
53. Encrypting Virus
Assessment Exercise- 20
54. How to Continue Your Research in Hacking
Course Assessment
We'll help you to grow your career and growth
Honhaar Jawan
Honhaar Jawan © 2026. All Rights Reserved. Developed and Maintained by Honhaar Jawan.