Home
About us
Courses
Schools
School of Decentralized Economics
School of Cyber Resilience
School of Intelligent Systems
School of Design Thinking
Partners
Certification & Knowledge Partner
Academic Partner
Hiring Partner
Delivery Partner
Affiliate Partner
Hybrid Center Partner
3.0uni SANDBOX
Blog
3.0 TV
Home
About us
Courses
Schools
School of Decentralized Economics
School of Cyber Resilience
School of Intelligent Systems
School of Design Thinking
Partners
Certification & Knowledge Partner
Academic Partner
Hiring Partner
Delivery Partner
Affiliate Partner
Hybrid Center Partner
3.0uni SANDBOX
Blog
3.0 TV
Login
₹
0.00
0
Cart
Curriculum
20 Sections
30 Lessons
Lifetime
Expand all sections
Collapse all sections
Module 01 : Introduction to Ethical Hacking
2
1.1
Introduction to Cybersecurity Session 01
1.2
Introduction to Cybersecurity Session 02
Module 2 : Footprinting and Reconnaissance
1
2.1
Footprinting and Reconnaissance Session
Module 3 : Scanning Networks
3
3.1
Scanning Networks Session 01
3.2
Scanning Networks Session 02
3.3
Scanning Networks Session 03
Module 4 : Enumeration
1
4.1
Enumeration Session
Module 5 : Vulnerability Analysis
2
5.1
Vulnerability Analysis Session 01
5.2
Vulnerability Analysis Session 02
Module 6 : System Hacking
2
6.1
System Hacking Session 01
6.2
System Hacking Session 02
Module 7 : Malware Threats
1
7.1
Malware Threats Session 01
Module 8 : Sniffing
2
8.1
Sniffing Session 01
8.2
Sniffing Session 02
Module 9 : Social Engineering
1
9.1
Social Engineering Session 01
Module 10 : Denial-of-Service
1
10.1
Denial Of Service Session
Module 11 : Session Hijacking
1
11.1
Session Hijacking Session
Module 12 : Evading IDS, Firewalls, and Honeypots
1
12.1
Evading IDS – Firewalls and Honeypots Session
Module 13 : Hacking Web Servers
2
13.1
Hacking Web Servers Session 01
13.2
Hacking Web Servers Session 02
Module 14 : Hacking Web Applications
2
14.1
Hacking Web Application Session 1
14.2
Hacking Web Application Session 2
Module 15 : SQL Injection
1
15.1
SQL Injection Session
Module 16 : Hacking Wireless Networks
1
16.1
Hacking Wireless Networks Session
Module 17 : Hacking Mobile Platforms
1
17.1
Hacking Mobile Platforms Session
Module 18 : IoT Hacking
2
18.1
IoT Hacking Session 01
18.2
IoT Hacking Session 2
Module 19 : Cloud Computing
2
19.1
Cloud Computing Session 01
19.2
Cloud Computing Session 02
Module 20 : Cryptography
1
20.1
Cryptography Session
This content is protected, please
login
and
enroll
in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content