WHAT IS ETHICAL HACKING ?
Ethical Hacking Course Syllabus
The syllabus for Ethical Hacking varies for different courses. Some of the common topics that most Ethical Hacking Courses cover are as given below in the table.
| Cyber Ethics-Hacking Introduction | Information Gathering |
| Scanning | Google Hacking Database |
| Virus, Worms – Virus Analysis | Trojans and Backdoors |
| Sniffers and keyloggers | Social Engineering |
| Email, DNS, IP spoofing | System Hacking and Security |
| HoneyPots | – |
Certified Ethical Hacker Course Syllabus
Certified Ethical Hacker Course is a course by Ec-Council and is recognised globally. Their modules are designed for providing a comprehensive ethical hacking and penetration testing training and covers various topics. Here is a list of topics that are covered in the Certified Ethical Hacker Course.
| Introduction to Ethical Hacking | Footprinting and Reconnaissance |
| Scanning Networks | Enumeration |
| System Hacking | Malware Threats |
| Sniffing | Social Engineering |
| Denial of Service | Session Hijacking |
| Hacking Web Servers | Hacking Web Applications |
| SQL Injection | Hacking Wireless Networks |
| Hacking Mobile Platforms | Evading IDS, Firewalls and Honeypot |
| Cloud Computing | Cryptography |
CEH v11 Syllabus
CEH v11 has a total of 20 modules. The topics may differ from other versions. The modules of CEH v11 course are given below in the table.
| Modules | Topics |
|---|---|
| 1 | Introduction to Ethical Hacking |
| 2 | Footprinting and Reconnaissance |
| 3 | Scanning Networks |
| 4 | Enumeration |
| 5 | Vulnerability Analysis |
| 6 | System Hacking |
| 7 | Malware Threats |
| 8 | Sniffing |
| 9 | Social Engineering |
| 10 | Denial-of-Service |
| 11 | Session Hijacking |
| 12 | Evading IDS, Firewalls, and Honeypots |
| 13 | Hacking Web Servers |
| 14 | Hacking Web Applications |
| 15 | SQL Injection |
| 16 | Hacking Wireless Networks |
| 17 | Hacking Mobile Platforms |
| 18 | IoT and OT Hacking |
| 19 | Cloud Computing |
| 20 | Cryptography |
Hacking Course Syllabus
Hacking Course covers Ethical Hacking, Website Hacking and Security and Mobile and Wireless security in general. Given below in the table is a list of topics that are covered in the above-mentioned.
| Ethical Hacking | |
|---|---|
| Information Gathering | Cyber Ethics |
| Hacking Introduction | Trojans and Backdoors |
| Sniffers and keyloggers | Google Hacking Database |
| Virus and Virus Analysis | Email, DNS, IP spoofing |
| HoneyPots | Social Engineering |
| System Hacking and Security | – |
| Website Hacking And Security | |
| SQL Injection | XSS Attacks and Countermeasures |
| LFI/ RFI Attacks and Countermeasures | Vulnerability Research |
| Vulnerability Assessment and Penetration Testing | Exploit Writing |
| Information Disclosure Vulnerabilities | Buffer Overflow and Session Hijacking Attacks |
| Secure Coding Practices | – |
| Mobile And Wireless Security | |
| SMS Forging and Countermeasures | Wireless Hacking and Security |
| VoIP Hacking and Countermeasures | – |
Cyber Security and Ethical Hacking Course Syllabus
Cyber Security and Ethical Hacking Course covers various areas related to Ethical Hacking such as Cloud Computing, Introduction to Ethical Hacking, Denial of Service, Hacking Mobile Platforms, Social Engineering and more. The table below consists of the list of topics that are covered in various Cyber Security and Ethical Hacking Courses.
| Cloud Computing | Introduction to Ethical Hacking |
| Denial of Service | Hacking Mobile Platforms |
| Cryptography | Hacking Web Servers |
| Session Hijacking | Scanning Networks |
| Social Engineering | Malware Threats |
| Footprinting and Reconnaissance | SQL Injection |
| Evading IDS, Firewalls and Honeypots | Enumeration |






