1 ) Chapter : Introduction to Ethical Hacking
1.1) What is Ethical Hacking?
1.2) Types of Hackers:- White Hat, Black Hat, Grey Hat
1.3) Ethical Hacking vs Malicious Hacking
1.4) Scope and Need of Ethical Hacking
1.5) Legal Framework and Cyber Laws
1.6) Phases of Ethical Hacking:- Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks
2 ) Chapter : Basics of Computer Networking
2.1 What is a Computer Network?
2.2 Network Types: LAN, WAN, MAN, PAN
2.3 Network Topologies and Protocols
2.4 OSI and TCP/IP Models
2.5 Ports, IP Addressing, and Subnetting
Chapter 3: Networking Devices and Communication
3.1 Routers, Switches, Firewalls, Gateways
3.2 DNS, DHCP, NAT, and MAC
3.3 Packet Structure and Encapsulation
3.4 Public vs Private Networks
3.5 Common Protocols: HTTP, HTTPS, FTP, Telnet, SSH