Back to Course
CSRP | Ethical Hacking
0% Complete
0/0 Steps
-
course overview
Course Syllabus | Ethical Hacking -
Module 1: Introduction to Ethical HackingThe Ethics of Hacking – White Hat vs. Black Hat
-
The Penetration Testing Process
-
Self-Study: Famous Hacks & Lessons Learned
-
Module 2: Information Gathering & ReconnaissancePassive Reconnaissance Techniques
-
Active Scanning & Network Mapping
-
Self-Study: OSINT & Network Recon
-
Module 3: Exploitation TechniquesExploiting Network Vulnerabilities
-
Web Application Hacking (OWASP Top 10)
-
Self-Study: Web Hacking Techniques
-
Module 4: Wireless, Social Engineering, and Physical SecurityWireless Network Hacking
-
Social Engineering & Physical Security
-
Self-Study: Human Hacking Techniques
-
Module 5: Post-Exploitation & Maintaining AccessPrivilege Escalation & Lateral Movement
-
Covering Tracks & Persistence Techniques
-
Self-Study: Real-World Malware & Persistence Tactics
-
Module 6: Final Assessment & Capstone ProjectPenetration Test Planning & Reporting
-
Capstone Project – Full-Scale Penetration Test
-
Self-Study: Final Exam & Project Submission