Course Content
1. Chapter-1 Introduction
1. Objectives
You don't currently have access to this content
2. What is Ethical Hacking
You don't currently have access to this content
3. What is Hacker
You don't currently have access to this content
4. Why do People Hack
You don't currently have access to this content
5. Types of hacking
You don't currently have access to this content
6.Hacking Terminology
You don't currently have access to this content
7. Five Phases of Hacking
You don't currently have access to this content
8. Penetration Test and Phases of Pentesting
You don't currently have access to this content
9. Infosec Teams
You don't currently have access to this content
10. Security Assessment Cycle
You don't currently have access to this content
11. Required Skills of an Ethical hacker
You don't currently have access to this content
2. Chapter-2 Lab Setup
1. Concept of Virtualization
You don't currently have access to this content
2. How Does Virtualization Work
You don't currently have access to this content
3. Top Virtualization Vendors
You don't currently have access to this content
4. How does vmware product works
You don't currently have access to this content
5. How to Download Vmware
You don't currently have access to this content
6. How to Install vmware
You don't currently have access to this content
7. What is Kali Linux
You don't currently have access to this content
8. System Requirement for Kali Linux
You don't currently have access to this content
9. How to Download Kali Linux
You don't currently have access to this content