02-09-2026, 04:33 PM
![[Image: 1JHO8B0.png]](https://i.imgur.com/1JHO8B0.png)
Course Outline
� Module I : Introduction to Ethical Hacking
� Module II: Footprinting
� Module III: Scanning
� Module IV: Enumeration
� Module V: System Hacking
� Module VI: Trojans and Backdoors
� Module VII: Sniffers
� Module VIII: Denial of Service
� Module IX: Social Engineering
� Module X: Session Hijacking
� Module XI: Hacking Web Servers
� Module XII: Web Application Vulnerabilities
� Module XIII: Web Based Password Cracking Techniques
� Module XIV: SQL Injection
� Module XV: Hacking Wireless Networks
� Module XVI: Viruses
� Module XVII: Novell Hacking
� Module XVIII: Linux Hacking
� Module XIX: Evading IDS, Firewalls and Honey pots
� Module XX: Buffer Overflows
