Day 1:
● Introduction to Ethical Hacking: What is ethical hacking, its
importance, and the role of ethical hackers.
● Overview of hacking methodologies: Understanding the different
stages of hacking.
Day 2:
● Footprinting and Reconnaissance: Collecting information about a
target system, its services, and potential vulnerabilities.
● Tools for footprinting: Nmap, Shodan, WHOIS, etc.
Day 3:
● Intro to linux and installation
● Directory structure and linux commands
Day 4:
● Scanning and Enumeration: Identifying open ports, services, and user
accounts on target systems.
● Tools for scanning and enumeration: Nessus, OpenVAS, Netcat, etc.
Day 5:
● System Hacking: Gaining unauthorized access to target systems
using various techniques.
● Password cracking: Methods to crack passwords, including dictionary
attacks and brute-forcing.
Day 6:
● Malware and Trojans: Understanding different types of malware and
how they can be used in ethical hacking.
● Designing malware for android , windows and linux.
Day 7:
● Social Engineering: Exploiting human behavior to gain unauthorized
access to systems.
● Phishing attacks and prevention.
Day 8:
● Wireless Network Hacking: Exploiting vulnerabilities in wireless
networks.
● WEP and WPA/WPA2 cracking.
Day 9:
● Layer 2 Attacks MITM
● Sniffing and spoofing using different techniques
Day 10:
● Wireless Security: Securing wireless networks against attacks.
● Configuring WPA3, MAC filtering, and other security measures.
Day 11:
● Web Application Penetration Testing: Identifying and exploiting
vulnerabilities in web applications.
● SQL injection, XSS, CSRF, etc.
Day 12:
● Cryptography: Fundamentals of encryption, decryption, and
cryptographic attacks.
● Cracking encrypted messages.
Day 13:
● Steganography: Hiding information within other files and media.
● Detecting and analyzing steganographic content.
Day 14:
● Python for designing tools
● Using python to develop malwares
Day 15:
● Incident Handling and Response: Preparing for and responding to
security incidents.
● Incident handling frameworks.
Day 16:
● Web Application Security: Best practices for securing web
applications.
● Web application firewalls and security plugins
Day 17:
● Cyber Laws and Ethics: Understanding the legal and ethical
implications of ethical hacking.
● Responsibilities of an ethical hacker.
Day 18:
● Hacking hardware
● Using arduino to design hacking tools
Day 19:
● Final CTF (Capture the Flag) challenge: An integrated scenario to
apply skills learned throughout the course
Day 20:
● Different cyber security platforms and certifications for people who
want to advance career
● Jobs in pakistan