Apr 15, 2025
Introduction to Ethical Hacking
Types of Hackers
Types of System Attacks
Scope in Ethical Hacking
Cyber Laws
Networking Basics
OSI vs. TCP/IP Models
Networking Protocols
Domain Names and DNS
Request vs. Response in Networking
Linux Basics for Ethical Hacking
Setting Up a Hacking Lab
Complete Anonymous Settings
Footprinting and Reconnaissance