Skip to main content

Topic outline

  • How to join the Interactive Live Session?

    Once you've entered the required information, click on the link below (visible after registration) & "Join" or "Enter" button. This will take you to the virtual meeting room. "Join Session" button will appear when session starts. 

  • Module 1: Security Fundamentals

    A strong understanding of security basics, including cryptography, networking, and operating systems, is essential for any cybersecurity professional.


  • Module 2: Penetration Testing Methodologies

    Ethical hackers must know how to conduct a penetration test properly, including reconnaissance, vulnerability identification, exploitation, and post-exploitation.


  • Module 3: Web Application Security

    The security of web applications is a critical concern for organizations, and ethical hackers need to understand the common vulnerabilities that can be found in web applications.


  • Module 4: Network Security

    Network security is another essential area of expertise for ethical hackers, who need to be familiar with firewalls, intrusion detection and prevention systems, and other security technologies.


  • Module 5: Social Engineering

    Social engineering is the art of manipulating people to divulge sensitive information, and ethical hackers must be able to identify and defend against these types of attacks.


  • Module 6: Wireless Network Security

    Wireless networks can be especially vulnerable to attack, and ethical hackers need to know how to secure wireless networks and identify vulnerabilities.


  • Module 7: Cloud Security

    Cloud computing is becoming increasingly popular, and ethical hackers must know how to assess the security of cloud-based systems.


  • Module 8: Mobile device security

    Mobile devices are a growing target for attackers, and ethical hackers must be able to identify and exploit vulnerabilities in mobile operating systems and applications.


  • Module 9: Incident Response

    Ethical hackers must be able to respond quickly and effectively to security incidents, including malware infections, denial-of-service attacks, and other types of attacks.


  • Module 10: Final Test