1.1) What is Ethical Hacking?
1.2) Types of Hackers:- White Hat, Black Hat, Grey Hat
1.3) Ethical Hacking vs Malicious Hacking
1.4) Scope and Need of Ethical Hacking
1.5) Legal Framework and Cyber Laws
1.6) Phases of Ethical Hacking:- Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks
2.1 Passive vs Active Reconnaissance
2.2 Tools: Whois, Nslookup, Shodan, Maltego
2.3 Social Engineering Fundamentals
2.4 Email, Website, and DNS Footprinting
2.5 Detecting Reconnaissance Activities
Sign in to your account
Username or Email Address
Password
Remember Me
{{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}
{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}
Submitting…