Home
About us
Courses
Schools
School of Decentralized Economics
School of Cyber Resilience
School of Intelligent Systems
School of Design Thinking
Partners
Certification & Knowledge Partner
Academic Partner
Hiring Partner
Delivery Partner
Affiliate Partner
Hybrid Center Partner
3.0uni SANDBOX
Blog
3.0 TV
Home
About us
Courses
Schools
School of Decentralized Economics
School of Cyber Resilience
School of Intelligent Systems
School of Design Thinking
Partners
Certification & Knowledge Partner
Academic Partner
Hiring Partner
Delivery Partner
Affiliate Partner
Hybrid Center Partner
3.0uni SANDBOX
Blog
3.0 TV
Login
₹
0.00
0
Cart
Curriculum
20 Sections
25 Lessons
Lifetime
Expand all sections
Collapse all sections
Module 01 : Introduction to Ethical Hacking
3
1.1
Introduction to Ethical Hacking Session 01
1.2
Introduction to Ethical Hacking Session 02
1.3
Introduction to Ethical Hacking Session 03
Module 02 : Footprinting and Reconnaissance
2
2.1
Footprinting and Reconnaissance Session 01
2.2
Footprinting and Reconnaissance Session 02
Module 03 : Scanning Networks
1
3.1
Scanning Networks Session
Module 04 : Enumeration
1
4.1
Enumeration Session
Module 05 : Vulnerability Analysis
2
5.1
Vulnerability Analysis Session 01
5.2
Vulnerability Analysis Session 02
Module 06 : System Hacking
1
6.1
System Hacking Session
Module 07 : Malware Threats
1
7.1
Malware Threats Session
Module 08 : Sniffing
1
8.1
Sniffing Techniques Session
Module 09 : Social Engineering
1
9.1
Social Engineering and Countermeasures Session
Module 10 : Denial-of-Service
1
10.1
Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques Session
Module 11 : Session Hijacking
1
11.1
Session Hijacking Session
Module 12 : Evading IDS, Firewalls, and Honeypots
1
12.1
Evading IDS, Firewalls and Honeypots Session
Module 13 : Hacking Web Servers
1
13.1
Web Server Session
Module 14 : Hacking Web Applications
2
14.1
Hacking web application session 01
14.2
Hacking web application session 02
Module 15 : SQL Injection
1
15.1
SQL Injection Session
Module 16 : Hacking Wireless Networks
1
16.1
Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.
Module 17 : Hacking Mobile Platforms
1
17.1
Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
Module 18 : IoT Hacking
1
18.1
Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.
Module 19 : Cloud Computing
1
19.1
Cloud Computing Session 01
Module 20 : Cryptography
1
20.1
Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
This content is protected, please
login
and
enroll
in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content