1.1) What is Ethical Hacking?
1.2) Types of Hackers:- White Hat, Black Hat, Grey Hat
1.3) Ethical Hacking vs Malicious Hacking
1.4) Scope and Need of Ethical Hacking
1.5) Legal Framework and Cyber Laws
1.6) Phases of Ethical Hacking:- Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks
2.1 What is a Computer Network?
2.2 Network Types: LAN, WAN, MAN, PAN
2.3 Network Topologies and Protocols
2.4 OSI and TCP/IP Models
2.5 Ports, IP Addressing, and Subnetting
3.1 Routers, Switches, Firewalls, Gateways
3.2 DNS, DHCP, NAT, and MAC
3.3 Packet Structure and Encapsulation
3.4 Public vs Private Networks
3.5 Common Protocols: HTTP, HTTPS, FTP, Telnet, SSH
Sign in to your account