{"id":6390,"date":"2024-04-07T23:34:32","date_gmt":"2024-04-07T18:34:32","guid":{"rendered":"https:\/\/corvit.com\/systems\/?page_id=6390"},"modified":"2024-05-14T13:12:05","modified_gmt":"2024-05-14T08:12:05","slug":"ceh-certified-ethical-hacking","status":"publish","type":"page","link":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/","title":{"rendered":"CEH (Certified Ethical Hacking)"},"content":{"rendered":"[vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bg_color=&#8221;#cc3036&#8243; scene_position=&#8221;center&#8221; top_padding=&#8221;2%&#8221; bottom_padding=&#8221;2%&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_custom_heading text=&#8221;CEH (Certified Ethical Hacking) Outline&#8221; font_container=&#8221;tag:h1|font_size:40|text_align:left|color:%23ffffff|line_height:1.2&#8243; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1712515253140{margin-bottom: 3% !important;padding-top: 4% !important;}&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; top_padding=&#8221;28&#8243; bottom_padding=&#8221;28&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_column_text]<strong>Course Contents \/ Lesson Plan <\/strong><\/p>\n<p><strong>Course Title: <\/strong>CEH (Certified Ethical Hacking)<\/p>\n<p><strong>Duration: <\/strong>3 Months<\/p>\n<p><strong>Revised Edition<\/strong><\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"138\"><strong>Trainer Name<\/strong><\/td>\n<td width=\"556\"><\/td>\n<\/tr>\n<tr>\n<td width=\"138\"><strong>Author Name<\/strong><\/td>\n<td width=\"556\"><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"138\"><strong>Course Title<\/strong><\/td>\n<td width=\"556\"><strong>CEH (Certified Ethical Hacking)<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"138\"><strong>Objectives and Expectations<\/strong><\/td>\n<td width=\"556\"><strong>Employable skills and hands-on practice in CEH (Certified Ethical Hacking)<\/strong><\/p>\n<p>This is a special course designed to address unemployment in the youth. The course aims to achieve the above objective through hands on practical training delivery by a team of dedicated professionals having rich market\/work experience. This course is therefore not just for developing a theoretical understanding\/back ground of the trainees. Contrary to that, it is primarily aimed at equipping the trainees to perform commercially in a market space in independent capacity or as a member of a team.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>The course therefore is designed to impart not only technical skills but also soft skills (i.e. interpersonal\/communication skills; personal grooming of the trainees etc.) as well as entrepreneurial skills (i.e. marketing skills; freelancing etc.). The course also seeks to inculcate work ethics to foster better citizenship in general and improve the image of Pakistani work force in particular.<\/p>\n<p><strong><u>Main Expectations<\/u><\/strong><strong>:<\/strong><\/p>\n<p>In short, the course under reference should be delivered by professional instructors in such a robust hands-on manner that the trainees are comfortably able to employ their skills for earning money (through wage\/self-employment) at its conclusion.<\/p>\n<p>This course thus clearly goes beyond the domain of the traditional training practices in vogue and underscores an expectation that a market-centric approach will be adopted as the main driving force while delivering it. The instructors should therefore be experienced enough to be able to identify the training needs for the possible market roles available out there. Moreover, they should also know the strengths and weaknesses of each trainee to prepare them for such market roles during\/after the training.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>i.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong>Specially designed practical tasks to be performed by the trainees have been included in the Annexure-I to this document. The record of all tasks performed individually or in groups must be preserved by the management of the training Institute clearly labeling name, trade, session, etc. so that these are ready to be physically inspected\/verified through monitoring visits from time to time. The weekly distribution of tasks has also been indicated in the weekly lesson plan given in this document.<\/p>\n<p><strong>ii.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong>To materialize the main expectations, a special module on <strong><u>Job Search<\/u> <u>&amp; Entrepreneurial Skills<\/u> <\/strong>has been included in the latter part of this course (5<sup>th<\/sup> &amp; 6<sup>th<\/sup> month) through which, the trainees will be made aware of the Job search techniques in the local as well as international job markets (Gulf countries). Awareness around the visa process and<\/p>\n<p>immigration laws of the most favored labor destination countries also<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"134\"><\/td>\n<td width=\"559\">form a part of this module. Moreover, the trainees would also be encouraged to venture into self-employment and exposed to the main requirements in this regard. It is also expected that a sense of civic duties\/roles and responsibilities will also be inculcated in the trainees to make them responsible citizens of the country.<\/p>\n<p><strong>iii.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong>A module on <strong>Work Place Ethics <\/strong>has also been included to highlight the importance of good and positive behavior in the workplace in the line with the best practices elsewhere in the world. An outline of such qualities has been given in the Appendix to this document. Its importance should be conveyed in a format that is attractive and interesting for the trainees such as through PPT slides +short video documentaries. Needless to say that if the training provider puts his heart and soul into these otherwise non-technical components, the image of the Pakistani workforce would undergo a positive transformation in the local as well as international job markets.<\/p>\n<p>To maintain interest and motivation of the trainees throughout the course, modern techniques such as:<\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Motivational Lectures<\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Success Stories<\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Case Studies<\/p>\n<p>These techniques would be employed as an additional training tool wherever possible (these are explained in the subsequent section on Training Methodology).<\/p>\n<p>Lastly, evaluation of the competencies acquired by the trainees will be done objectively at various stages of the training and a proper record of the same will be maintained. Suffice to say that for such evaluations, practical tasks would be designed by the training providers to gauge the problem-solving abilities of the trainees.<\/p>\n<p><strong>(i)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Motivational Lectures<\/strong><\/p>\n<p>The proposed methodology for the training under reference employs motivation as a tool. Hence besides the purely technical content, a trainer is required to include elements of motivation in his\/her lecture. To inspire the trainees to utilize the training opportunity to the full and strive towards professional excellence. Motivational lectures may also include general topics such as the importance of moral values and civic role &amp; responsibilities as a Pakistani. A motivational lecture should be delivered with enough zeal to produce a deep impact on the trainees. It may comprise of the following:<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Clear Purpose to convey the message to trainees effectively.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Personal Story to quote as an example to follow.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Trainees Fit so that the situation is actionable by trainees and not represent a just idealism.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ending Points to persuade the trainees on changing themselves.<\/p>\n<p>A good motivational lecture should help drive creativity, curiosity, and spark the desire needed for trainees to want to learn more.<\/p>\n<p>The impact of a successful motivational strategy is amongst others commonly visible in increased class participation ratios. It increases the trainees\u2019 willingness to be engaged on the practical tasks for a longer time without boredom and loss of interest because they can see in their mind&#8217;s eye where their hard work would take them in short (1-3 years); medium (3 -10 years) and long term (more than 10 years).<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"134\"><\/td>\n<td width=\"559\">As this tool is expected that the training providers would make arrangements for regular well planned motivational lectures as part of a coordinated strategy interspersed throughout the training period as suggested in the weekly lesson plans in this document.<\/p>\n<p>Course-related motivational lectures online link is available in <strong>Annexure-II<\/strong>.<\/p>\n<p><strong>(ii)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Success Stories<\/strong><\/p>\n<p>Another effective way of motivating the trainees is using Success Stories. Its inclusion in the weekly lesson plan at regular intervals has been recommended till the end of the training.<\/p>\n<p>A success story may be disseminated orally, through a presentation, or using a video\/documentary of someone that has risen to fortune, acclaim, or brilliant achievement. A success story shows how a person achieved his goal through hard work, dedication, and devotion. An inspiring success story contains compelling and significant facts articulated clearly and easily comprehendible words. Moreover, it is helpful if it is assumed that the reader\/listener knows nothing of what is being revealed. The optimum impact is created when the story is revealed in the form of:-<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Directly in person (At least 2-3 cases must be arranged by the training institute)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Through an audio\/ videotaped message (2-3 high-quality videos must be arranged by the training institute)<\/p>\n<p>It is expected that the training provider would collect relevant high-quality success stories for inclusion in the training as suggested in the weekly lesson plan given in this document.<\/p>\n<p>The suggestive structure and sequence of a sample success story and its various shapes can be seen in <strong>Annexure III<\/strong>.<\/p>\n<p><strong>(iii)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Case Studies<\/strong><\/p>\n<p>Where a situation allows, case studies can also be presented to the trainees to widen their understanding of the real-life specific problem\/situation and to explore the solutions.<\/p>\n<p>In simple terms, the case study method of teaching uses a real-life case example\/a typical case to demonstrate a phenomenon in action and explain theoretical as well as practical aspects of the knowledge related to the same. It is an effective way to help the trainees comprehend in depth both the theoretical and practical aspects of the complex phenomenon in depth with ease. Case teaching can also stimulate the trainees to participate in discussions and thereby boost their confidence. It also makes the classroom atmosphere interesting thus maintaining the trainee interest in training till the end of the course.<\/p>\n<p>Depending on suitability to the trade, the weekly lesson plan in this document may suggest case studies be presented to the trainees. The trainer may adopt a PowerPoint presentation or video format for such case studies whichever is deemed suitable but only those cases must be selected that are relevant and of a learning value.<\/p>\n<p>The Trainees should be required and supervised to carefully analyze the cases.<\/p>\n<p>For this purpose, they must be encouraged to inquire and collect specific information\/data, actively participate in the discussions, and intended solutions to the problem\/situation.<\/p>\n<p>Case studies can be implemented in the following ways: &#8211;<\/p>\n<p>i.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 A\u00a0 good\u00a0 quality\u00a0 trade-specific\u00a0 documentary\u00a0 (\u00a0 At\u00a0 least\u00a0 2-3<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"137\"><\/td>\n<td width=\"556\">documentaries must be arranged by the training institute)<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>ii.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Health &amp;Safety case studies (2 cases regarding safety and industrial accidents must be arranged by the training institute)<\/p>\n<p>iii.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Field visits( At least one visit to a trade-specific major industry\/ site must be arranged by the training institute)<\/td>\n<\/tr>\n<tr>\n<td width=\"137\"><strong>Entry-level of trainees<\/strong><\/td>\n<td width=\"556\">For an advanced course of Cyber Security (CEH) proposed entry level is minimum bachelors in relevant subject, so expectations from the trainees are:<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Fundamentals of Networking.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Fundamentals of script programming.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Basic Cyber Security Concepts.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Basic Ethical Hacking Tools.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ethical Hacking Methodology.<\/td>\n<\/tr>\n<tr>\n<td width=\"137\"><strong>Learning <\/strong><strong>Outcomes of the course<\/strong><\/td>\n<td width=\"556\">By the end of this course, students will be able to:<\/p>\n<p><strong>Understanding of Ethical Hacking Concepts<\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Define ethical hacking and its role in cybersecurity.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Differentiate between ethical hacking and malicious hacking.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Comprehend the ethical and legal considerations in penetration testing.<\/p>\n<p><strong>Network Security Fundamentals<\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Demonstrate knowledge of network protocols and their vulnerabilities.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Understand network security architecture and defenses.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identify and mitigate common network-based attacks.<\/p>\n<p><strong>Information Security Technologies:<\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Familiarity with various security tools and technologies.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Proficiency in using penetration testing tools such as Nmap, Metasploit, Wireshark, etc.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Understanding of intrusion detection and prevention systems.<\/p>\n<p><strong>Web Application Security<\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identify and exploit common web application vulnerabilities.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Implement secure coding practices.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Perform web application security assessments.<\/p>\n<p><strong>Wireless Network Security<\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Analyze and secure wireless networks.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identify vulnerabilities in wireless protocols.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Implement measures to secure wireless communications.<\/p>\n<p><strong>System Security<\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Evaluate and secure operating systems.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Implement host-based security measures.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Understand and mitigate common system-level vulnerabilities.<\/p>\n<p><strong>Bug Bounty Concepts and Practices<\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Understand the bug bounty ecosystem.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Comprehend the role of bug bounty hunters and security researchers.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Develop skills for responsible disclosure of security vulnerabilities.<\/p>\n<p><strong>Practical Application of Ethical Hacking<\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Execute penetration testing methodologies.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Conduct vulnerability assessments on various targets.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Develop and execute a penetration testing plan.<\/p>\n<p><strong>Legal and Ethical Considerations<\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Understand the legal and ethical aspects of ethical hacking.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"137\"><\/td>\n<td width=\"556\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Comply with laws and regulations related to penetration testing.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Adhere to ethical guidelines and responsible disclosure practices.<\/td>\n<\/tr>\n<tr>\n<td width=\"137\"><strong>Course <\/strong><strong>Execution Plan<\/strong><\/td>\n<td width=\"556\">The total duration of the course: <strong>3 months (12 Weeks)<\/strong><\/p>\n<p>Class hours: <strong>4 hours per day<\/strong><\/p>\n<p>Theory: <strong>20%<\/strong><\/p>\n<p>Practical: <strong>80%<\/strong><\/p>\n<p>Weekly hours: <strong>20 hours per week<\/strong><\/p>\n<p>Total contact hours: <strong>260 hours<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"137\"><strong>Companies <\/strong><strong>offering jobs in the respective trade<\/strong><\/td>\n<td width=\"556\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Trillium<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Afinity<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 NetSole<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 I2c<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Multinet<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Nescom<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Transworld<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Netcom<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Systems<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Web Work Solution<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Purelogics<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Nets-international<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ebryx<\/td>\n<\/tr>\n<tr>\n<td width=\"137\"><strong>Job <\/strong><strong>Opportunities<\/strong><\/td>\n<td width=\"556\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Security Operations Centre (SOC) Engineer<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Network Administrator<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 IT Support Officer<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Manager \/ Assistant Manager IT<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Network support engineer<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Security Analysts<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Penetration tester<\/td>\n<\/tr>\n<tr>\n<td width=\"137\"><strong>No of Students<\/strong><\/td>\n<td width=\"556\">25<\/td>\n<\/tr>\n<tr>\n<td width=\"137\"><strong>Learning Place<\/strong><\/td>\n<td width=\"556\">Classroom \/ Lab<\/td>\n<\/tr>\n<tr>\n<td width=\"137\"><strong>Instructional Resources<\/strong><\/td>\n<td width=\"556\">1.\u00a0\u00a0\u00a0 Introduction to Cyber Security: https:\/\/www.youtube.com\/watch?v=z5nc9MDbvkw<\/p>\n<p>2.\u00a0\u00a0\u00a0 Cyber Security Crash Course in English: https:\/\/www.youtube.com\/watch?v=hXSFdwIOfnE<\/p>\n<p>3.\u00a0\u00a0\u00a0 Ethical Hacking Crash Course in Urdu: https:\/\/www.youtube.com\/watch?v=596WPxrBFqo<\/p>\n<p>4.\u00a0\u00a0\u00a0 Network Hacking Crash Course in Urdu: https:\/\/www.youtube.com\/watch?v=2hoeSbrtmLQ<\/p>\n<p>5.\u00a0\u00a0\u00a0 Bug Bounty Crash Course in Urdu: https:\/\/www.youtube.com\/watch?v=-<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"135\"><\/td>\n<td width=\"559\"><u>t95lFMndw4<\/u><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>MODULES<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"73\"><strong>Schedu <\/strong><strong>led<\/strong><\/p>\n<p><strong>Weeks<\/strong><\/td>\n<td width=\"128\"><strong>Module Title<\/strong><\/td>\n<td width=\"80\"><strong>Days<\/strong><\/td>\n<td width=\"86\"><strong>Hours<\/strong><\/td>\n<td width=\"209\"><strong>Learning Units<\/strong><\/td>\n<td width=\"117\"><strong>Home <\/strong><strong>Assignment<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"73\"><strong>Week 1<\/strong><\/td>\n<td width=\"128\"><strong>Introduction to CEH and LAB Setup<\/strong><\/td>\n<td width=\"80\"><strong>Day 1<\/strong><\/td>\n<td width=\"86\"><strong>Hour 1<\/strong><\/td>\n<td width=\"209\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Motivational Lecture<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Course Intro<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Success stories<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Job Market<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Intro to CEH<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Roles of Security Expert<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 What is cyberspace.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 What is hacker and its different types.<\/td>\n<td width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td width=\"73\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"80\"><\/td>\n<td width=\"86\"><strong>Hour 2<\/strong><\/td>\n<td width=\"209\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 What is virus and its different types<\/td>\n<td width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td width=\"73\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"80\"><\/td>\n<td width=\"86\"><strong>Hour 3<\/strong><\/td>\n<td width=\"209\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Different types of attacks.<\/td>\n<td width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td width=\"73\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"80\"><\/td>\n<td width=\"86\"><strong>Hour 4<\/strong><\/td>\n<td rowspan=\"2\" width=\"209\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Setup virtual machine for LAB environment.<\/td>\n<td width=\"117\">\u00b7 <strong>Task 1<\/strong><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"73\"><\/td>\n<td rowspan=\"2\" width=\"128\"><\/td>\n<td width=\"80\"><\/td>\n<td width=\"86\"><\/td>\n<td rowspan=\"2\" width=\"117\"><em><u>Details may<\/u><\/em><em> <u>be seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"80\"><strong>Day 2<\/strong><\/td>\n<td width=\"86\"><strong>Hour 1<\/strong><\/td>\n<td width=\"209\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Install and configure Kali Linux<\/td>\n<\/tr>\n<tr>\n<td width=\"73\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"80\"><\/td>\n<td width=\"86\"><strong>Hour 2<\/strong><\/td>\n<td width=\"209\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Intro Kali Linux.<\/td>\n<td width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td width=\"73\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"80\"><\/td>\n<td width=\"86\"><\/td>\n<td width=\"209\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Important Linux<\/td>\n<td width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td width=\"73\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"80\"><\/td>\n<td width=\"86\"><\/td>\n<td width=\"209\">Commands<\/td>\n<td width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td width=\"73\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"80\"><\/td>\n<td width=\"86\"><strong>Hour 3<\/strong><\/td>\n<td width=\"209\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Get familiar with OSI Layers<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Different functions of OSI layers.<\/td>\n<td width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td width=\"73\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"80\"><\/td>\n<td width=\"86\"><strong>Hour 4<\/strong><\/td>\n<td width=\"209\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Protocols of each layers<\/td>\n<td width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td width=\"73\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"80\"><strong>Day 3<\/strong><\/td>\n<td width=\"86\"><strong>Hour 1<\/strong><\/td>\n<td width=\"209\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Get familiar with TCP\/IP suit.<\/td>\n<td width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td width=\"73\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"80\"><\/td>\n<td width=\"86\"><strong>Hour 2<\/strong><\/td>\n<td width=\"209\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Different protocols and ports.<\/td>\n<td width=\"117\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"10\" width=\"71\"><\/td>\n<td rowspan=\"10\" width=\"128\"><\/td>\n<td rowspan=\"2\" width=\"79\"><\/td>\n<td width=\"85\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Basic Network Configuration<\/td>\n<td rowspan=\"10\" width=\"115\"><\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">Hands-on Practice on LAB<\/p>\n<p>Setup for testing<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"79\"><strong>Day 4<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Open Source Intelligence (OSINT) Overview<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Passive vs. Active Information Gathering<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Information Gathering Methodologies<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ethical Considerations in OSINT<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Footprinting and Reconnaissance<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Search Engine Hacking<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Social Media Intelligence<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"79\"><strong>Day 5<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Email and Domain Information Gathering<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Metadata Analysis<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 WHOIS Data and Domain Ownership<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 DNS Enumeration<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Enumeration of Network Services<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">Hands-on Practice with an Information Gathering<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"71\"><strong>Week 2<\/strong><\/td>\n<td rowspan=\"2\" width=\"128\"><strong>Information Gathering<\/strong><\/td>\n<td rowspan=\"2\" width=\"79\"><strong>Day 1<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Shodan and IoT Device Information<\/td>\n<td rowspan=\"2\" width=\"115\"><strong>\u00a0<\/strong><\/p>\n<p>\u00b7 <strong>Task 2<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><em><u>Details may<\/u><\/em><em> <u>be seen at<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Maltego for Data Link Analysis<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"15\" width=\"69\"><\/td>\n<td rowspan=\"15\" width=\"125\"><\/td>\n<td rowspan=\"2\" width=\"82\"><\/td>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The Harvester for<\/p>\n<p>Gathering Emails and Subdomains<\/td>\n<td rowspan=\"15\" width=\"117\"><em><u>Annexure-<\/u><\/em><em><u>I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Spokeo and People Search Tools<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"82\"><strong>Day 2<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data Scraping Techniques<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Google Dorks and Advanced Search Queries<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Geolocation and IP Tracing<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Social Engineering for Information Gathering Algorithms<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Gathering Information on Mobile Apps<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"82\"><strong>Day 3<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">Deep Web and Dark Web Information Gathering<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">Tor and Onion Sites Exploration<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">Threat Intelligence Feeds<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">OSINT Frameworks and Tools<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"82\"><strong>Day 4<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">Visualizing OSINT Data<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">OSINT for Digital Forensics<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">OSINT for Incident Response<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">Legal and Ethical Aspects of OSINT<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><strong>Day 5<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1-4<\/strong><\/td>\n<td width=\"213\">Practical on OSINT Investigations<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"71\"><\/td>\n<td width=\"129\"><\/td>\n<td width=\"79\"><\/td>\n<td width=\"85\"><\/td>\n<td width=\"212\"><\/td>\n<td width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"8\" width=\"71\"><strong>Week 3<\/strong><\/td>\n<td rowspan=\"8\" width=\"129\"><strong>Scanning &amp; Enumeration<\/strong><\/td>\n<td rowspan=\"4\" width=\"79\"><strong>Day 1<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Network Scanning Fundamentals<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Types of Network Scans<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Port Scanning Techniques<\/td>\n<td rowspan=\"8\" width=\"117\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7 <strong>Task 3<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><em><u>Details may<\/u><\/em><em> <u>be seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 2<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 TCP Connect Scanning<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 UDP Scanning<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Banner Grabbing<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 3<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Network Enumeration Methods<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Scanning Tools and Utilities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Nmap &#8211; Network Mapper<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 4<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ping Sweeps and Sweep Detection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Network Mapping and Topology Discovery<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Vulnerability Scanning<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"79\"><strong>Day 2<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Operating System Detection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Automated Scanning Workflows<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Scanning for Web Applications<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 2<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Threat Intelligence Integration<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wireless Network Scanning<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Automating Scans with Scripts<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 3<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Scanning Best Practices<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Scanning Ethics and Legal Considerations<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Post-Scanning Analysis<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 4<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Scanning for Insider Threats<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Enumeration Basics<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 NetBIOS Enumeration<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"10\" width=\"71\"><\/td>\n<td rowspan=\"10\" width=\"129\"><\/td>\n<td rowspan=\"4\" width=\"79\"><strong>Day 3<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SNMP Enumeration<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 LDAP Enumeration<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SMB Enumeration<\/td>\n<td rowspan=\"10\" width=\"115\"><\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 DNS Enumeration<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SMTP Enumeration<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 NTP Enumeration<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SSH Enumeration<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 RDP Enumeration<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Port Enumeration Techniques<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 User Enumeration<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Share Enumeration<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Vulnerability Enumeration<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"79\"><strong>Day 4<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Enumeration Tools and Scanners<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Nmap Scripts for Enumeration<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SNMP Enumeration Tools<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 LDAP Enumeration Tools<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SMB Enumeration Tools<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 DNS Enumeration Tools<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SMTP Enumeration Tools<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Enumeration for Active Directory<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Enumeration for Linux<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Enumeration for Windows<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Enumeration Best Practices<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Enumeration Ethics and Legal Considerations<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"79\"><strong>Day 5<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1-2<\/strong><\/td>\n<td width=\"214\">Practical on Comprehensive Network Scan<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 3-4<\/strong><\/td>\n<td width=\"214\">Practical on Comprehensive Enumeration<\/td>\n<\/tr>\n<tr>\n<td width=\"71\"><strong>Week 4<\/strong><\/td>\n<td width=\"129\"><strong>Vulnerability Analysis<\/strong><\/td>\n<td width=\"79\"><strong>Day 1<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Vulnerability Assessment Fundamentals<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Types of Vulnerabilities<\/td>\n<td width=\"115\">\u00b7 <strong>Task 4<\/strong><\/p>\n<p><em><u>Details may<\/u><\/em><em> <u>be seen at<\/u><\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"13\" width=\"70\"><\/td>\n<td rowspan=\"13\" width=\"125\"><\/td>\n<td rowspan=\"3\" width=\"82\"><\/td>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">Vulnerability Scanning Techniques<\/td>\n<td rowspan=\"13\" width=\"117\"><em><u>Annexure-<\/u><\/em><em><u>I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">Automated Vulnerability Scanners<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">Manual Vulnerability Assessment<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"82\"><strong>Day 2<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Common Vulnerability Databases<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Common Vulnerability Scoring System (CVSS)<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">Vulnerability Management Practices<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">Vulnerability Analysis Tools<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">Nmap Scripting Engine (NSE) for Vulnerability Scanning<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"82\"><strong>Day 3<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">OpenVAS &#8211; Open Vulnerability Assessment System<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">Nessus Vulnerability Scanner<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">Qualys Vulnerability Management<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Vulnerability Assessment in Web Applications<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 OWASP Top Ten Vulnerabilities<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"82\"><strong>Day 4<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">Vulnerability Analysis for Mobile Applications<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">Vulnerability Analysis for Network Devices<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"4\" width=\"71\"><\/td>\n<td rowspan=\"4\" width=\"127\"><\/td>\n<td rowspan=\"2\" width=\"79\"><\/td>\n<td width=\"85\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Reporting and Remediation of Vulnerabilities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exploitation Frameworks and Vulnerabilities<\/td>\n<td rowspan=\"4\" width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Vulnerability Analysis Best Practices<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of Vulnerability Analysis<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"79\"><strong>Day 5<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">Vulnerability Analysis Case Studies<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 2-4<\/strong><\/td>\n<td width=\"213\">Practical on Comprehensive Vulnerability Analysis<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"5\" width=\"71\"><strong>Week 5<\/strong><\/td>\n<td rowspan=\"5\" width=\"127\"><strong>System <\/strong><strong>Hacking &amp; Malware Analysis<\/strong><\/td>\n<td rowspan=\"4\" width=\"79\"><strong>Day 1<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 System Hacking Fundamentals<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Password Cracking Techniques<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Password Cracking Tools<\/td>\n<td rowspan=\"5\" width=\"117\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7 <strong>Task 5<\/strong><\/p>\n<p><em><u>Details may<\/u><\/em><em> <u>be seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Privilege Escalation Methods<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exploiting Weak Passwords<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Brute Force and Dictionary Attacks<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cracking Windows Passwords<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cracking Linux Passwords<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Privilege Escalation on Windows<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Privilege Escalation on Linux<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Rootkits and Trojans<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Hiding Files and Processes<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Covering Tracks and Removing Evidence<\/td>\n<\/tr>\n<tr>\n<td width=\"79\"><strong>Day 2<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Malware and Backdoors<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Social Engineering for System Hacking<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Phishing Attacks<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"7\" width=\"70\"><\/td>\n<td rowspan=\"7\" width=\"126\"><\/td>\n<td rowspan=\"3\" width=\"82\"><\/td>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Spear Phishing and Whaling<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Email Spoofing and Impersonation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Bypassing Antivirus Software<\/td>\n<td rowspan=\"7\" width=\"113\"><\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Keyloggers and Spyware<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Remote Administration Tools (RATs)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Advanced Persistent Threats (APTs)<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Fileless Malware<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Post-Exploitation Techniques<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exploitation Frameworks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of System Hacking<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"82\"><strong>Day 3<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Malware Analysis<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Malware Analysis Fundamentals<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Types of Malware and Malicious Code<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Malware Analysis Environments and Sandboxes<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Static Analysis Techniques<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Dynamic Analysis Techniques<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Behavioral Analysis of Malware<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Memory Analysis and Forensics<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Disassembling and Debugging Malicious Code<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Code Injection and Hooking Techniques<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Deobfuscation and Decryption<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 YARA Rules for Malware Detection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identifying and<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"9\" width=\"72\"><\/td>\n<td rowspan=\"9\" width=\"128\"><\/td>\n<td width=\"80\"><\/td>\n<td width=\"86\"><\/td>\n<td width=\"210\">Classifying Malware Families<\/td>\n<td rowspan=\"9\" width=\"118\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"80\"><strong>Day 4<\/strong><\/td>\n<td width=\"86\"><strong>Hour 1<\/strong><\/td>\n<td width=\"210\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Packets Analysis for Malware Detection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Building Custom Malware Analysis Tools<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Network Traffic Analysis<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 2<\/strong><\/td>\n<td width=\"210\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Malware Artifacts and Indicators of Compromise (IoC)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Threat Intelligence and Malware Data Sources<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Building a Malware Sandbox<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 3<\/strong><\/td>\n<td width=\"210\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Building a YARA Rule Library<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Building a Memory Forensics Toolkit<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Building Custom Analysis Scripts<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 4<\/strong><\/td>\n<td width=\"210\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Practical Malware Analysis Techniques<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of Malware Analysis<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"80\"><strong>Day 5<\/strong><\/td>\n<td width=\"86\"><strong>Hour 1<\/strong><\/td>\n<td width=\"210\">System Hacking Case Studies<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 2<\/strong><\/td>\n<td width=\"210\">Malware Analysis Case Studies<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 3<\/strong><\/td>\n<td width=\"210\">Practical on Comprehensive System Hacking<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 4<\/strong><\/td>\n<td width=\"210\">Practical on Analyzing Real-World Malware Samples<\/td>\n<\/tr>\n<tr>\n<td width=\"72\"><strong>Week 6<\/strong><\/td>\n<td width=\"128\"><strong>Network <\/strong><strong>Sniffing &amp; Wifi Hacking<\/strong><\/td>\n<td width=\"80\"><strong>Day 1<\/strong><\/td>\n<td width=\"86\"><strong>Hour 1<\/strong><\/td>\n<td width=\"210\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Network Packet Sniffing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of Sniffing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wireshark and Packet Capture Basics<\/td>\n<td width=\"118\">\u00b7\u00a0 <strong>Task 6<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><em><u>Details may<\/u><\/em><em> <u>be seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"9\" width=\"70\"><\/td>\n<td rowspan=\"9\" width=\"126\"><\/td>\n<td rowspan=\"3\" width=\"82\"><\/td>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Analyzing Captured Packets<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Packet Filtering and Display Options<\/td>\n<td rowspan=\"9\" width=\"114\"><\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Advanced Protocol Analysis<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Packet Decryption Techniques<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Capturing and Analyzing SSL\/TLS Traffic<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Sniffing on Wireless Networks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Sniffing on Switched Networks<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"82\"><strong>Day 2<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 ARP Spoofing and<\/p>\n<p>MITM Attacks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 DNS Spoofing and Cache Poisoning<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 VoIP Traffic Sniffing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Sniffing for Malware Traffic<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Network Sniffing for Intrusion Detection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Building Custom Sniffing Tools<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Sniffing Case Studies and Real-World Scenarios<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Sniffing for Security and Troubleshooting<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Sniffing Best Practices and Avoiding Detection<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"82\"><strong>Day 3<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Wireless Networks and Security<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of Wireless Hacking<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wireless Network Fundamentals (Wi-Fi, WEP, WPA, WPA2)<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"212\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wireless Encryption Protocols (WEP, WPA, WPA2, WPA3)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Understanding Wi-Fi Security Vulnerabilities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Scanning for Wireless Networks (SSID, BSSID)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"6\" width=\"70\"><\/td>\n<td rowspan=\"6\" width=\"126\"><\/td>\n<td rowspan=\"2\" width=\"82\"><\/td>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wireless Access Points (APs) and SSID Enumeration<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Rogue AP Detection and Mitigation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cracking WEP Encryption<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cracking WPA\/WPA2 Encryption (Dictionary Attacks, WPS)<\/td>\n<td rowspan=\"6\" width=\"113\"><\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Evil Twin Attacks and Fake Aps<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Capturing and Analyzing Wireless Traffic<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wi-Fi Password Cracking Tools (e.g., Aircrack-ng)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wardriving and GPS Mapping of Wi-Fi Networks<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"82\"><strong>Day 4<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Hacking Public Wi-Fi Hotspots<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wireless Network Auditing Tools (e.g., Kismet, Fern-Wifi- Cracker)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wireless Sniffing and Packet Injection<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Deauthentication and<\/p>\n<p>Jamming Attacks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Evading MAC Address Filtering<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wi-Fi Pineapple and Rogue Device Attacks<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wireless Network Intrusion Detection<\/p>\n<p>Systems (NIDS)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cracking WPA3 Encryption (if applicable)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Security Best Practices for Wireless Networks<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Protecting Your Own Wireless Network<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal Implications of Unauthorized Wireless Hacking<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Real-World Wireless Hacking Scenarios<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"71\"><\/td>\n<td rowspan=\"2\" width=\"128\"><\/td>\n<td rowspan=\"2\" width=\"78\"><strong>Day 5<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1-2<\/strong><\/td>\n<td width=\"214\">Practical on Real-World Sniffing and Analysis<\/td>\n<td rowspan=\"2\" width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 3-4<\/strong><\/td>\n<td width=\"214\">Practical on Penetration Testing of a Wireless Network<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"8\" width=\"71\"><strong>Week 7<\/strong><\/td>\n<td rowspan=\"8\" width=\"128\"><strong>Social <\/strong><strong>Engineering &amp; Session Hijacking<\/strong><\/td>\n<td rowspan=\"4\" width=\"78\"><strong>Day 1<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Social Engineering<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of Social Engineering<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Information Gathering for Social Engineering<\/td>\n<td rowspan=\"8\" width=\"117\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7\u00a0 <strong>Task 7<\/strong><\/p>\n<p><em><u>Details may<\/u><\/em><em> <u>be seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Pretexting and Impersonation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Phishing and Spear Phishing Attacks<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Baiting and Tailgating Attacks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Influence and Persuasion Techniques<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Manipulating Human Behavior<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Building Trust and Rapport<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Elicitation and Information Extraction<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"78\"><strong>Day 2<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Psychological Profiling<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Social Engineering in the Digital Age<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Social Engineering for Physical Access<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Social Engineering for Unauthorized Information Access<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Building Custom Social Engineering Attacks<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Practical Social Engineering Exercises within Kali Linux<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Countermeasures and Defense Strategies<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Social Engineering Case Studies and Scenarios<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ethical and Responsible Social Engineering<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"10\" width=\"71\"><\/td>\n<td rowspan=\"10\" width=\"128\"><\/td>\n<td rowspan=\"4\" width=\"80\"><strong>Day 3<\/strong><\/td>\n<td width=\"86\"><strong>Hour 1<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Session Hijacking<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of Session<\/p>\n<p>Hijacking<\/td>\n<td rowspan=\"10\" width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 2<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Session Management in Web Applications<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Session Hijacking Techniques (e.g., Session Fixation)<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 3<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cross-Site Scripting (XSS) Attacks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cross-Site Request Forgery (CSRF) Attacks<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 4<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Man-in-the-Middle (MitM) Attacks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Session Fixation Attacks<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"80\"><strong>Day 4<\/strong><\/td>\n<td width=\"86\"><strong>Hour 1<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Session Sidejacking and Sniffing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Session Replay Attacks<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 2<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Building Custom Session Hijacking Tools<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Detecting and Mitigating Session Hijacking<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 3<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Building Secure Session Management in Web Apps<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Real-World Session Hijacking Scenarios<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 4<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Practical Session Hijacking Exercises and Demonstrations<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Countermeasures and Defense Strategies<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"80\"><strong>Day 5<\/strong><\/td>\n<td width=\"86\"><strong>Hour 1-2<\/strong><\/td>\n<td width=\"211\">Practical on Executing a Social Engineering Attack within Kali Linux<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 3-4<\/strong><\/td>\n<td width=\"211\">Practical on Executing a Session Hijacking Attack<\/td>\n<\/tr>\n<tr>\n<td width=\"71\"><strong>Week 8<\/strong><\/td>\n<td width=\"128\"><strong>DOS\/DDOS &amp;<\/strong><\/p>\n<p><strong>SQL Injection Attack<\/strong><\/td>\n<td width=\"80\"><strong>Day 1<\/strong><\/td>\n<td width=\"86\"><strong>Hour 1<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Denial of Service Attacks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of DoS Attacks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Types of DoS Attacks (e.g., Flood, Amplification, Logic<\/p>\n<p>Bombs)<\/td>\n<td width=\"117\"><strong>\u00a0<\/strong><\/p>\n<p>\u00b7\u00a0 <strong>Task 8<\/strong><\/p>\n<p><em><u>Details may<\/u><\/em><em> <u>be seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"10\" width=\"70\"><\/td>\n<td rowspan=\"10\" width=\"126\"><\/td>\n<td rowspan=\"3\" width=\"82\"><\/td>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Distributed Denial of Service (DDoS) Attacks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Botnets and Botnet Herders<\/td>\n<td rowspan=\"10\" width=\"113\"><\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Reflective and Amplification Attacks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Protocol-Based Attacks (e.g., SYN Flood)<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Application Layer Attacks (e.g., HTTP Flood)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Denial of Service Attack Tools<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"82\"><strong>Day 2<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 DoS Attack Techniques and Strategies<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Detection and Mitigation of DoS Attacks<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Stress Testing and Load Balancing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Building Custom DoS Attack Tools<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of DoS Testing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Real-World DoS Attack Scenarios<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Protecting Against DoS Attacks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Countermeasures and Defense Strategies<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"82\"><strong>Day 3<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to SQL Injection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of SQL Injection Testing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SQL Injection Fundamentals<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Union-Based SQL Injection<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Blind SQL Injection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Time-Based Blind SQL Injection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Out-of-Band SQL Injection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Second-Order SQL Injection<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Error-Based SQL Injection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Stored SQL Injection<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"8\" width=\"70\"><\/td>\n<td rowspan=\"8\" width=\"126\"><\/td>\n<td rowspan=\"2\" width=\"82\"><\/td>\n<td width=\"88\"><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Blind Second-Order SQL Injection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Boolean-Based Blind SQL Injection<\/td>\n<td rowspan=\"8\" width=\"113\"><\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SQL Injection through Different Attack Vectors<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Automated SQL Injection Tools<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Detecting and Analyzing SQL Injection Attacks<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"82\"><strong>Day 4<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Preventing SQL Injection in Web Applications<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Error-Based Information Gathering<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Union-Based Data Extraction<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Time-Based Blind SQL Injection Techniques<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Out-of-Band Data Exfiltration<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SQL Injection through Form Fields<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SQL Injection through URL Parameters<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Advanced SQL Injection Techniques<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exploiting SQL Injection for Privilege Escalation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Bypassing Web Application Firewalls (WAFs)<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Evading Detection with Obfuscation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Implications of Exploiting SQL Injection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Real-World SQL Injection Scenarios<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Practical SQL Injection Exercises<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"82\"><strong>Day 5<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1-2<\/strong><\/td>\n<td width=\"213\">Practical on Executing a DoS\/DDoS Attack<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3-4<\/strong><\/td>\n<td width=\"213\">Practical on Exploiting and Preventing SQL Injection<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"9\" width=\"71\"><strong>Week 9<\/strong><\/td>\n<td rowspan=\"9\" width=\"128\"><strong>Hacking Web Servers &amp; Web Applications<\/strong><\/td>\n<td rowspan=\"4\" width=\"78\"><strong>Day 1<\/strong><\/td>\n<td width=\"84\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Web Server Hacking<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of Web Server Hacking<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Web Server Fundamentals (e.g., Apache, Nginx)<\/td>\n<td rowspan=\"9\" width=\"117\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7\u00a0 <strong>Task 9<\/strong><\/p>\n<p><em><u>Details may<\/u><\/em><em> <u>be seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"84\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Information Gathering and Reconnaissance<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Vulnerability Scanning and Enumeration<\/td>\n<\/tr>\n<tr>\n<td width=\"84\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Web Server Misconfigurations<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Directory Traversal Attacks<\/td>\n<\/tr>\n<tr>\n<td width=\"84\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 File Inclusion Vulnerabilities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SQL Injection in Web Servers<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Remote Code Execution (RCE)<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"78\"><strong>Day 2<\/strong><\/td>\n<td width=\"84\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exploiting Known Vulnerabilities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Web Shells and Backdoors<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Denial of Service Attacks on Web Servers<\/td>\n<\/tr>\n<tr>\n<td width=\"84\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Password Cracking for Server Access<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Privilege Escalation Techniques<\/td>\n<\/tr>\n<tr>\n<td width=\"84\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Web Server Hardening and Security<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Building Secure Web Applications<\/td>\n<\/tr>\n<tr>\n<td width=\"84\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Real-World Web Server Hacking Scenarios<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Practical Web Server Hacking Exercises and Demonstrations<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Countermeasures and Defense Strategies<\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>Day 3<\/strong><\/td>\n<td width=\"84\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Web Application Hacking<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of Web Application Hacking<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Web Application<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"10\" width=\"70\"><\/td>\n<td rowspan=\"10\" width=\"126\"><\/td>\n<td rowspan=\"4\" width=\"82\"><\/td>\n<td width=\"88\"><\/td>\n<td width=\"214\">Fundamentals (e.g., HTML, HTTP, Cookies)<\/td>\n<td rowspan=\"10\" width=\"113\"><\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Information Gathering and Reconnaissance<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Web Application Scanning and<\/p>\n<p>Enumeration<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identifying Common Web Application Vulnerabilities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cross-Site Scripting (XSS)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SQL Injection in Web Applications<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cross-Site Request Forgery (CSRF)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Insecure Deserialization<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"82\"><strong>Day 4<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Security Misconfigurations<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Session Management Vulnerabilities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Web Application Fuzzing and Testing<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Attacking Authentication and Authorization<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 File Upload and File Inclusion Vulnerabilities<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Web Application Firewalls (WAFs)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Secure Coding and Development Best Practices<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Real-World Web Application Hacking Scenarios<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Practical Web Application Hacking Exercises and Demonstrations<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Countermeasures and Defense Strategies<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"82\"><strong>Day 5<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1-2<\/strong><\/td>\n<td width=\"214\">Practical on Hacking a Web Server<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3-4<\/strong><\/td>\n<td width=\"214\">Practical on Hacking a Web Application<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"11\" width=\"73\"><strong>Week <\/strong><strong>10<\/strong><\/td>\n<td rowspan=\"11\" width=\"127\"><strong>Hacking Mobile Platforms<\/strong><\/td>\n<td rowspan=\"4\" width=\"80\"><strong>Day 1<\/strong><\/td>\n<td width=\"86\"><strong>Hour 1<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Mobile Platform Security<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of Mobile<\/p>\n<p>Hacking<\/td>\n<td rowspan=\"11\" width=\"117\">\u00b7 <strong>Task 10<\/strong><\/p>\n<p><em><u>Details may<\/u><\/em><em> <u>be seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 2<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Mobile Platform Fundamentals (iOS, Android)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Mobile Application Security Models<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 3<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identifying Mobile Security Vulnerabilities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Setting Up a Mobile Hacking Environment<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 4<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Device and Emulator Testing<\/p>\n<p>Jailbreaking (iOS) and Rooting (Android)<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"80\"><strong>Day 2<\/strong><\/td>\n<td width=\"86\"><strong>Hour 1<\/strong><\/td>\n<td width=\"211\">Analyzing Mobile Apps for<\/p>\n<p>Vulnerabilities<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 2<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data Storage and Encryption on Mobile Devices<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Insecure Data Transmission (e.g., SSL<\/p>\n<p>Pinning Bypass)<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 3<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Mobile API Testing and Manipulation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Reverse Engineering Mobile Apps<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 4<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exploiting Authentication and Authorization Flaws<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 In-App Purchases and License Verification<\/p>\n<p>Bypass<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"80\"><strong>Day 3<\/strong><\/td>\n<td width=\"86\"><strong>Hour 1<\/strong><\/td>\n<td width=\"211\">Tampering with Mobile App<\/p>\n<p>Logic<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 2<\/strong><\/td>\n<td width=\"211\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Mobile Malware and Spyware<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Real-World Mobile Exploits and Vulnerabilities<\/td>\n<\/tr>\n<tr>\n<td width=\"86\"><strong>Hour 3<\/strong><\/td>\n<td width=\"211\">Detecting and Preventing<\/p>\n<p>Mobile Exploits<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"6\" width=\"73\"><\/td>\n<td rowspan=\"6\" width=\"131\"><\/td>\n<td width=\"77\"><\/td>\n<td width=\"83\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Mobile Application Security Best Practices<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ethical Use of Mobile Hacking Skills<\/td>\n<td rowspan=\"6\" width=\"116\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"77\"><strong>Day 4<\/strong><\/td>\n<td width=\"83\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Mobile Hacking Challenges and CTFs<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iOS Jailbreaks and Bypassing Security Features<\/td>\n<\/tr>\n<tr>\n<td width=\"83\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Android Rooting and Custom ROMs<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Mobile App Debugging and Patching<\/td>\n<\/tr>\n<tr>\n<td width=\"83\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Application Security Testing on Real Devices<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Malware Analysis on Mobile Platforms<\/td>\n<\/tr>\n<tr>\n<td width=\"83\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Mobile Device Forensics<\/td>\n<\/tr>\n<tr>\n<td width=\"77\"><strong>Day 5<\/strong><\/td>\n<td width=\"83\"><strong>Hour 1-4<\/strong><\/td>\n<td width=\"213\">Practical on Hacking a Mobile App or Device<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"73\"><strong>Week <\/strong><strong>11<\/strong><\/td>\n<td rowspan=\"4\" width=\"131\"><strong>Cryptography <\/strong><strong>&amp; Bug Bounty<\/strong><\/td>\n<td rowspan=\"4\" width=\"77\"><strong>Day 1<\/strong><\/td>\n<td width=\"83\"><strong>Hour 1<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Cryptography<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of Cryptography<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Basic Concepts of Cryptography (Encryption, Decryption)<\/td>\n<td rowspan=\"4\" width=\"116\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7\u00a0 <strong>Task 11 <\/strong><em><u>Details may<\/u><\/em><em> <u>be seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"83\"><strong>Hour 2<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Classical Cryptography (Caesar, Vigen\u00e8re, etc.)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Modern Cryptography Techniques (AES, RSA,<\/p>\n<p>ECC, etc.)<\/td>\n<\/tr>\n<tr>\n<td width=\"83\"><strong>Hour 3<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cryptographic Hash Functions (MD5, SHA, etc.)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Public Key Infrastructure (PKI)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cryptographic Protocols (SSL\/TLS, SSH, etc.)<\/td>\n<\/tr>\n<tr>\n<td width=\"83\"><strong>Hour 4<\/strong><\/td>\n<td width=\"213\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cryptanalysis and Attacks on Cryptosystems<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Quantum Cryptography and Post-Quantum<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"9\" width=\"70\"><\/td>\n<td rowspan=\"9\" width=\"126\"><\/td>\n<td width=\"82\"><\/td>\n<td width=\"88\"><\/td>\n<td width=\"214\">Cryptography<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Secure Key Management and<\/p>\n<p>Exchange<\/td>\n<td rowspan=\"9\" width=\"113\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"82\"><strong>Day 2<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cryptographic Libraries and APIs<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Implementing Cryptographic Algorithms<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Digital Signatures and Authentication<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Secure Communication with Cryptography<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cryptography in Blockchain Technology<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cryptography in Network Security<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cryptography in Mobile Security<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cryptography in Web Application Security<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Real-World Cryptographic Attacks and Defenses<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Practical Cryptographic Exercises<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"82\"><strong>Day 3<\/strong><\/td>\n<td width=\"88\"><strong>Hour 1<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Bug Bounty Programs<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Legal and Ethical Aspects of Bug Bounty Hunting<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Bug Bounty Platforms and Marketplaces<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 2<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Setting Up a Bug Bounty Hunter Profile<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Finding and Researching Bug Bounty Programs<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Types of Security Vulnerabilities (OWASP Top Ten)<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 3<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Reconnaissance and Footprinting for Bug Bounties<\/td>\n<\/tr>\n<tr>\n<td width=\"88\"><strong>Hour 4<\/strong><\/td>\n<td width=\"214\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Web Application Testing for Security Vulnerabilities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Mobile Application<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"7\" width=\"73\"><\/td>\n<td rowspan=\"7\" width=\"128\"><\/td>\n<td width=\"79\"><\/td>\n<td width=\"85\"><\/td>\n<td width=\"210\">Testing for Security Vulnerabilities<\/td>\n<td rowspan=\"7\" width=\"118\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"79\"><strong>Day 4<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1<\/strong><\/td>\n<td width=\"210\">Network and Infrastructure Testing for Security Vulnerabilities<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 2<\/strong><\/td>\n<td width=\"210\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identifying Security Vulnerabilities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Proof of Concept (PoC) and Exploitation<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 3<\/strong><\/td>\n<td width=\"210\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Bug Triage and Severity Assessment<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Creating Detailed Bug Bounty Reports<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 4<\/strong><\/td>\n<td width=\"210\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Communication with Bug Bounty Programs<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Bug Bounty Rewards and Payments<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Bug Bounty Platform Tools and Resources<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"79\"><strong>Day 5<\/strong><\/td>\n<td width=\"85\"><strong>Hour 1-2<\/strong><\/td>\n<td width=\"210\">Practical on Cryptography<\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><strong>Hour 3-4<\/strong><\/td>\n<td width=\"210\">Practical on Bug Bounty Hunting<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"73\"><strong>Week <\/strong><strong>12<\/strong><\/td>\n<td rowspan=\"4\" width=\"128\"><strong>Final Exam and Assessment<\/strong><\/td>\n<td rowspan=\"4\" width=\"79\"><\/td>\n<td width=\"85\"><\/td>\n<td width=\"210\"><\/td>\n<td rowspan=\"4\" width=\"118\">\u00b7 <strong>Task 12<\/strong><\/p>\n<p><em><u>Details may<\/u><\/em><em> <u>be seen at<\/u> <u>Annexure-I<\/u><\/em><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Final Project<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><\/td>\n<td width=\"210\"><\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><\/td>\n<td width=\"210\"><\/td>\n<\/tr>\n<tr>\n<td width=\"85\"><\/td>\n<td width=\"210\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong><u>Tasks for Certificate\u00a0<\/u><\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"59\"><strong>Task No.<\/strong><\/td>\n<td width=\"171\"><strong>Task<\/strong><\/td>\n<td width=\"378\"><strong>Description<\/strong><\/td>\n<td width=\"85\"><strong>Week<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"59\"><strong>1.<\/strong><\/td>\n<td width=\"171\"><strong>Introduction to CEH and LAB Setup<\/strong><\/td>\n<td width=\"378\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Hands-on Practice on LAB Setup for testing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Hands-on Practice on an Information Gathering<\/td>\n<td width=\"85\"><strong>Week 1<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"59\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>2.<\/strong><\/td>\n<td width=\"171\"><strong>Information Gathering<\/strong><\/td>\n<td width=\"378\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Investigate a suspicious domain or website associated with a potential security incident. Analyze the domain registration details, check for potential malicious activities, and provide actionable intelligence for an incident response<\/p>\n<p>team.<\/td>\n<td width=\"85\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 2<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"59\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>3.<\/strong><\/td>\n<td width=\"171\"><strong>Scanning &amp; Enumeration<\/strong><\/td>\n<td width=\"378\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Conduct a comprehensive network scan on a given network to identify all active hosts and services. Perform vulnerability scanning on the identified hosts to assess potential security weaknesses.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Perform active enumeration on a Windows-based network to identify Active Directory (AD) users, groups, and systems. Explore potential vulnerabilities for privilege escalation and demonstrate the ability to exploit them.<\/td>\n<td width=\"85\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 3<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"59\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>4.<\/strong><\/td>\n<td width=\"171\"><strong>Vulnerability Analysis<\/strong><\/td>\n<td width=\"378\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Conduct a comprehensive vulnerability assessment across an organization&#8217;s network infrastructure. Identify vulnerabilities in network devices, servers, and applications. Perform a risk analysis to prioritize and mitigate the identified<\/p>\n<p>vulnerabilities.<\/td>\n<td width=\"85\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 4<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"59\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>5.<\/strong><\/td>\n<td width=\"171\"><strong>System Hacking &amp; Malware Analysis<\/strong><\/td>\n<td width=\"378\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 A system administrator accidentally locked themselves out of a critical server by misconfiguring firewall rules. You need to regain access to the server without causing downtime or data loss.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 A user&#8217;s system has been infected with malware, potentially granting unauthorized access. Your task is to investigate the<\/p>\n<p>system, identify the attack vectors, and remediate the damage.<\/td>\n<td width=\"85\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 5<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"60\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>6.<\/strong><\/td>\n<td width=\"171\"><strong>Network Sniffing &amp; Wifi Hacking<\/strong><\/td>\n<td width=\"377\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 A small business is experiencing network connectivity problems, causing disruptions to their operations. Your task is to use sniffing techniques to diagnose the root cause of the issues and propose solutions.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 You are tasked with conducting a wireless security assessment for a client&#8217;s premises. Your goal is to identify any unauthorized or hidden wireless networks that could pose security risks.<\/td>\n<td width=\"86\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 6<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"60\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>7.<\/strong><\/td>\n<td width=\"171\"><strong>Social Engineering &amp; Session Hijacking<\/strong><\/td>\n<td width=\"377\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 A company&#8217;s CEO is traveling abroad, and a malicious actor wants to access their confidential emails. They craft a phishing email that appears to be from the IT department, requesting the CEO&#8217;s password for an urgent security update.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identify and exploit a session-related vulnerability in a web application. Hijack a user&#8217;s session and perform actions on their behalf.<\/td>\n<td width=\"86\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 7<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"60\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>8.<\/strong><\/td>\n<td width=\"171\"><strong>DOS\/DDOS &amp; SQL<\/strong><\/p>\n<p><strong>Injection Attack<\/strong><\/td>\n<td width=\"377\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Use ethical hacking tools like Kali Linux and Metasploit to simulate DoS\/DDoS attacks against a test server or network in a controlled environment.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identify a vulnerable login form on a web application. Use SQL injection techniques to bypass authentication and log in as a different<\/p>\n<p>user. Demonstrate how prepared statements can prevent this attack.<\/td>\n<td width=\"86\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 8<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"60\"><strong>\u00a0<\/strong><\/p>\n<p><strong>9.<\/strong><\/td>\n<td width=\"171\"><strong>Hacking Web Servers &amp; Web Applications<\/strong><\/td>\n<td width=\"377\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 You are given a web application with a known vulnerability in a shopping cart module. Your goal is to exploit the vulnerability to gain access to the web server and retrieve sensitive user data<\/td>\n<td width=\"86\"><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 9<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"60\"><strong>\u00a0<\/strong><\/p>\n<p><strong>10.<\/strong><\/td>\n<td width=\"171\"><strong>Hacking Mobile Platforms<\/strong><\/td>\n<td width=\"377\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Bypass authentication mechanisms in a mobile game to gain unauthorized access to premium features or manipulate game scores.<\/td>\n<td width=\"86\"><strong>\u00a0<\/strong><\/p>\n<p><strong>Week10<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"60\"><strong>\u00a0<\/strong><\/p>\n<p><strong>11.<\/strong><\/td>\n<td width=\"171\"><strong>Cryptography &amp; Bug Bounty<\/strong><\/td>\n<td width=\"377\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Implement password hashing using a secure algorithm like bcrypt or Argon2. Assess the strength of different hashing methods and explore<\/p>\n<p>password cracking techniques.<\/td>\n<td width=\"86\"><strong>\u00a0<\/strong><\/p>\n<p><strong>Week11<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"60\"><strong>12.<\/strong><\/td>\n<td width=\"171\"><strong>Final Exam and Assessment<\/strong><\/td>\n<td width=\"377\"><\/td>\n<td width=\"86\"><strong>Week12<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;full_width_content&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; top_padding=&#8221;4%&#8221; bottom_padding=&#8221;4%&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; class=&#8221;contact-form-with-img&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_color=&#8221;#406f5b&#8221; shape_divider_position=&#8221;bottom&#8221; shape_divider_height=&#8221;100&#8243; shape_divider_bring_to_front=&#8221;true&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;waves&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; zindex=&#8221;-999999999&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;5\/12&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][image_with_animation image_url=&#8221;2806&#8243; animation=&#8221;Fade In&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221; el_class=&#8221;img-side-contact&#8221;][\/vc_column][vc_column column_padding=&#8221;padding-6-percent&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;left-right&#8221; top_margin_phone=&#8221;4%&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;7\/12&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_custom_heading text=&#8221;Quick Inquiry&#8221; font_container=&#8221;tag:h2|font_size:36|text_align:left|color:%23000000|line_height:1.2&#8243; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1677876449507{margin-bottom: 3% !important;padding-top: 4% !important;}&#8221; el_id=&#8221;contact&#8221;][vc_column_text]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f121-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/systems\/wp-json\/wp\/v2\/pages\/6390#wpcf7-f121-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"121\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.9.8\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f121-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/div>\n<div class=\"col-2\">\n\t<p><i class=\"fa fa-user-o\" aria-hidden=\"true\"><\/i><span class=\"wpcf7-form-control-wrap\" data-name=\"full-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Enter Full Name\" value=\"\" type=\"text\" name=\"full-name\" \/><\/span><i class=\"fa fa-envelope\"><\/i><span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Enter Full Email\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"col-2\">\n\t<p><i class=\"fa fa-volume-control-phone\" aria-hidden=\"true\"><\/i><span class=\"wpcf7-form-control-wrap\" data-name=\"Phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Enter Your Phone\" value=\"\" type=\"tel\" name=\"Phone\" \/><\/span><i class=\"fa fa-comment-o\" aria-hidden=\"true\"><\/i><span class=\"wpcf7-form-control-wrap\" data-name=\"services\"><select class=\"wpcf7-form-control wpcf7-select wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" name=\"services\"><option value=\"Choose Course\">Choose Course<\/option><option value=\"CCNA\">CCNA<\/option><option value=\"CCNP\">CCNP<\/option><option value=\"CCIE\">CCIE<\/option><option value=\"HCIA\">HCIA<\/option><option value=\"HCIP\">HCIP<\/option><option value=\"HCIE\">HCIE<\/option><option value=\"MCSA\">MCSA<\/option><option value=\"MCITP\">MCITP<\/option><option value=\"MCSE\">MCSE<\/option><option value=\"Hyper-V\">Hyper-V<\/option><option value=\"Microsoft Azure\">Microsoft Azure<\/option><option value=\"AWS Associate\">AWS Associate<\/option><option value=\"AWS Professional\">AWS Professional<\/option><option value=\"Dev Ops\">Dev Ops<\/option><option value=\"JNCIA ENT\">JNCIA ENT<\/option><option value=\"JNCIP ENT\">JNCIP ENT<\/option><option value=\"Juniper Firewall\">Juniper Firewall<\/option><option value=\"VCP Data Center Virtualization\">VCP Data Center Virtualization<\/option><option value=\"RHCE\">RHCE<\/option><option value=\"RHCSA\">RHCSA<\/option><option value=\"RHCSA in OpenStack\">RHCSA in OpenStack<\/option><option value=\"RHCVA\">RHCVA<\/option><option value=\"SEO\">SEO<\/option><option value=\"Graphic Designing\">Graphic Designing<\/option><option value=\"Structured Cabling\">Structured Cabling<\/option><option value=\"Ethical Hacking\">Ethical Hacking<\/option><option value=\"Optical Fiber Networking\">Optical Fiber Networking<\/option><option value=\"Web Development\">Web Development<\/option><option value=\"Mobile App Development\">Mobile App Development<\/option><option value=\"ITIL\">ITIL<\/option><option value=\"CISSP\">CISSP<\/option><option value=\"Digital Marketing\">Digital Marketing<\/option><option value=\"CISA\">CISA<\/option><option value=\"CEH\">CEH<\/option><option value=\"Palo Alto Firewall\">Palo Alto Firewall<\/option><option value=\"Artificial Intelligence\">Artificial Intelligence<\/option><option value=\"F5 BIG-IP LTM\">F5 BIG-IP LTM<\/option><option value=\"Advance Python\">Advance Python<\/option><option value=\"Fortinet Firewall\">Fortinet Firewall<\/option><\/select><\/span>\n\t<\/p>\n<\/div>\n<div>\n\t<p><i class=\"fas fa-comment-alt-lines\" aria-hidden=\"true\"><\/i><span class=\"wpcf7-form-control-wrap\" data-name=\"message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Would you like to add more?\" name=\"message\"><\/textarea><\/span>\n\t<\/p>\n<\/div>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"inquire now\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bg_color=&#8221;#cc3036&#8243; scene_position=&#8221;center&#8221; top_padding=&#8221;2%&#8221; bottom_padding=&#8221;2%&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":6325,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CEH (Certified Ethical Hacking) Course Outline | Corvit Systems<\/title>\n<meta name=\"description\" content=\"Explore our comprehensive CEH course outline. Gain expertise in ethical hacking, penetration testing, and security analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CEH (Certified Ethical Hacking) Course Outline | Corvit Systems\" \/>\n<meta property=\"og:description\" content=\"Explore our comprehensive CEH course outline. Gain expertise in ethical hacking, penetration testing, and security analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Corvit\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corvittraining\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-14T08:12:05+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"25 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/\",\"url\":\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/\",\"name\":\"CEH (Certified Ethical Hacking) Course Outline | Corvit Systems\",\"isPartOf\":{\"@id\":\"https:\/\/corvit.com\/systems\/#website\"},\"datePublished\":\"2024-04-07T18:34:32+00:00\",\"dateModified\":\"2024-05-14T08:12:05+00:00\",\"description\":\"Explore our comprehensive CEH course outline. Gain expertise in ethical hacking, penetration testing, and security analysis.\",\"breadcrumb\":{\"@id\":\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/corvit.com\/systems\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NAVTTC Course Outlines\",\"item\":\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CEH (Certified Ethical Hacking)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/corvit.com\/systems\/#website\",\"url\":\"https:\/\/corvit.com\/systems\/\",\"name\":\"Corvit Systems\",\"description\":\"Best IT Certification Training Institute in Lahore\",\"publisher\":{\"@id\":\"https:\/\/corvit.com\/systems\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/corvit.com\/systems\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/corvit.com\/systems\/#organization\",\"name\":\"Corvit Systems\",\"url\":\"https:\/\/corvit.com\/systems\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/corvit.com\/systems\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Corvit Systems\"},\"image\":{\"@id\":\"https:\/\/corvit.com\/systems\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/corvittraining\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CEH (Certified Ethical Hacking) Course Outline | Corvit Systems","description":"Explore our comprehensive CEH course outline. Gain expertise in ethical hacking, penetration testing, and security analysis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/","og_locale":"en_US","og_type":"article","og_title":"CEH (Certified Ethical Hacking) Course Outline | Corvit Systems","og_description":"Explore our comprehensive CEH course outline. Gain expertise in ethical hacking, penetration testing, and security analysis.","og_url":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/","og_site_name":"Corvit","article_publisher":"https:\/\/www.facebook.com\/corvittraining","article_modified_time":"2024-05-14T08:12:05+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"25 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/","url":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/","name":"CEH (Certified Ethical Hacking) Course Outline | Corvit Systems","isPartOf":{"@id":"https:\/\/corvit.com\/systems\/#website"},"datePublished":"2024-04-07T18:34:32+00:00","dateModified":"2024-05-14T08:12:05+00:00","description":"Explore our comprehensive CEH course outline. Gain expertise in ethical hacking, penetration testing, and security analysis.","breadcrumb":{"@id":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/ceh-certified-ethical-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/corvit.com\/systems\/"},{"@type":"ListItem","position":2,"name":"NAVTTC Course Outlines","item":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/"},{"@type":"ListItem","position":3,"name":"CEH (Certified Ethical Hacking)"}]},{"@type":"WebSite","@id":"https:\/\/corvit.com\/systems\/#website","url":"https:\/\/corvit.com\/systems\/","name":"Corvit Systems","description":"Best IT Certification Training Institute in Lahore","publisher":{"@id":"https:\/\/corvit.com\/systems\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/corvit.com\/systems\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/corvit.com\/systems\/#organization","name":"Corvit Systems","url":"https:\/\/corvit.com\/systems\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/corvit.com\/systems\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Corvit Systems"},"image":{"@id":"https:\/\/corvit.com\/systems\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corvittraining"]}]}},"_links":{"self":[{"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/pages\/6390"}],"collection":[{"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/comments?post=6390"}],"version-history":[{"count":0,"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/pages\/6390\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/pages\/6325"}],"wp:attachment":[{"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/media?parent=6390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}