1.1) What is Ethical Hacking?
1.2) Types of Hackers:- White Hat, Black Hat, Grey Hat
1.3) Ethical Hacking vs Malicious Hacking
1.4) Scope and Need of Ethical Hacking
1.5) Legal Framework and Cyber Laws
1.6) Phases of Ethical Hacking:- Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks
2.1 Passive vs Active Reconnaissance
2.2 Tools: Whois, Nslookup, Shodan, Maltego
2.3 Social Engineering Fundamentals
2.4 Email, Website, and DNS Footprinting
2.5 Detecting Reconnaissance Activities
Sign in to your account