Module1: Introduction to Ethical Hacking
Module2: Introduction to Kali Linux and its Tools
Module3: Information Gathering and Footprinting
Module4: Basics of Networking and Web Technologies
Module5: Virtual Private Networks
Module6: Proxy Server
Module7: Enumeration User Identification
Module8: Google Hacking Database (GHDB)
Module9: System Hacking Password Cracking & Bypassing
Module10: WiFi Hacking and Security
Module11:Sniffing and Network Monitoring
Module12:Email Hacking and Social Engineering
Module13:Denial-Of-Service Attack
Module14: Reverse Engineering
Module15: Data Hiding Techniques
Module16: Penetration Testing
Module17:Website Penetration Testing
Module18:Virus, Worms and Trojans
Module19: Firewall, IDS and Honeypots
Module20:Metasploit