PAID ETHICAL HACKING AND CYBER SECURITY COURSE OUTLINE Day 1 , 2 Tracking A Person Location Information Gathering Osint( image search ) IP Tracking Get Victim Information Via image searchin Get Geolocation Via Phishing link Using Seeker and Online tools ( Location Track ) Day 3 , 4 Secure Your Information From Hacker Basic Cryptography Symmetric Key Cryptography Asymmetric Key Cryptography Hash Function Cryptography Hide or Secure your information using Cryptography Day 5 , 6 Secure Your Information From Hacker Basic Steganography Hide your Information inside of Image Extract Victim Information from Image Extract Victim Information from Audio Day 7 Networking and Wi-Fi Hacking Basic Networking (G) Day 8 , 9 Networking and Wi-Fi Hacking Advanced Wifi Hacking Brute Force Attack (G) Day 10 Networking and Wi-Fi Hacking Networking Hacking Via DNS Attack (G) Day 11 Networking and Wi-Fi Hacking Wireless network Hacking with automating redirection (G) Day 12 Hacking Using Metasploit Basic Use Of Mestploit Basic Metasploit (G) Modules Explained Day 13 Hacking Using Metasploit Vulnerability researching by Metasploit Virus Creating (G) Day 14 Hacking Using Metasploit Windows 10 Hacking by Metasploit (G) Day 15 Hacking Using Metasploit Android Hacking by Metasploit (G) Day 16 , 17 Hacking Using Metasploit Hacking Using Steganography (G) Binding payload messages and data behind images videos and apk Day 18 DIGITAL FORENSICS Digital Forensics 1 File Signature (F) Open bad format file via analyzing file magic numbers or file signatures Day 19 DIGITAL FORENSICS Digital Forensics 2 Wire shark Class 1 ( G) Monitoring or Analyzing Different protocol ( Packet Capture file ) using wire shark Day 20 DIGITAL FORENSICS Digital Forensics 3 Wire shark Class 1 ( G) Monitoring or Analyzing Different protocol ( Packet Capture file ) using wire shark Day 21 DIGITAL FORENSICS Digital Forensics 3 Data Retrieve using Autopsy (F) Recover Data from Pendrive Memory Using Autopsy Day 22 Website Hacking Basic Web IP Server Protocol Domain Name IP Classic Server Protocol Types Port Scanning using Nmap Rust scan Day 23 Website Hacking What is website hacking and how to work it (S) Day 24 Website Hacking Instrument and requirements for website hacking (S) Day 25 Website Hacking What is sql injection and dump website data using sql injection (S) Day 26 Website Hacking What is xss and how to xss work (S) Day 27 Website Hacking OWASP Top Vulnerabilities OS Injection (F) Day 28 Website Hacking LFI RFI (F) Day 29 Website Hacking IDOR Vulnerabilities Using Burp Suite (F) Day 30 Website Hacking Cookies Stolen (F) Day 31 Website Hacking Brute Force Attack Using Hydra Login page Username & Password Hacked SSH Username & Password Hacked FTP username & password(F) Day 32 Website Hacking What is file upload vulnerability and How it work (S) Day 33 Website Hacking What is php shell and uses of shell (S) Day 34 , 35 Website Hacking Shell Uploading and Privilege Escalation ( F ) Upload Web shell Reverse Shell On Target Website Get Control of Admin or Root Via Privilege Escalation Day 36 , 37 Learn Hacking With Mobile Website hacking basic with Mobile Phone Google Dorking For get Information About target or Victim Website SQL Injection XSS (S) Day 38 Learn Hacking With Mobile Social media account cracking with mobile phone (S) Day 39 , 40 Learn Hacking With Mobile What is termux Using termux and important tools review (S) Day 41 , 42 Python Programming For Ethical Hacking Python For Ethical Hacking And Python Environment Configure (G) Day 43-47 Python Programming For Ethical Hacking Python Basic Loop Function Conditional Statements Python Data Structure ) (G) Day 48 Python Programming For Ethical Hacking Object Oriented Python (G) Day 49 Python Programming For Ethical Hacking Modules Importing Packages (G) Day 50 Python Programming For Ethical Hacking Create Domain to IP Convertor Tools Using Python (F) Day 51 Python Programming For Ethical Hacking Create Port Scanner ( Like Nmap or rustscan ) using Python (F) Day 52 Python Programming For Ethical Hacking Create Source code Downloader Tools Using Python (F) Day 53 Python Programming For Ethical Hacking Socket programming for making hacking tools (G) Day 54 Python Programming For Ethical Hacking Create Keylogger Tools Using Python (G) Day 55 Python Programming For Ethical Hacking DNS Spoofing Using Python (G) Day 56 Python Programming For Ethical Hacking Create Backdoor Using Python (G) BONUS Introduction with Bug-Bounty Freelancing CTF THANK YOU