
CEH v10
- Introduction to Ethical Hacking
- Footprinting and reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing
- Cryptography

ECSA
- 1. Penetration Testing Essential Concepts This is an Essential Prerequisite as it helps you to prepares you the ECSA courseware. Serves as a base to build Advanced Pen Testing Concepts
- 2. Password Cracking Penetration Testing
- 3. Denial-of-Service Penetration Testing
- 4. Stolen Laptop, PDAs and Cell Phones Penetration Testing
- 5. Source Code Penetration Testing
- 6. Physical Security Penetration Testing
- 7. Surveillance Camera Penetration Testing
- 8. VoIP Penetration Testing
- 9. VPN Penetration Testing
- 10. Virtual Machine Penetration Testing
- 11. War Dialing
- 12. Virus and Trojan Detection
- 13. Log Management Penetration Testing
- 14. File Integrity Checking
- 15. Telecommunication and Broadband Communication Penetration Testing
- 16. Email Security Penetration Testing
- 17. Security Patches Penetration Testing
- 18. Data Leakage Penetration Testing
- 19. SAP Penetration Testing
- 20. Standards and Compliance
- 21. Information System Security Principles
- 22. Information System Incident Handling and Response
- 23. Information System Auditing and Certification

CHFI
- Module 1. Computer Forensics in Today’s World Module
- Module 2. Computer Forensics Investigation Process
- Module 3. Understanding Hard Disks and File Systems
- Module 4. Data Acquisition and Duplication
- Module 5. Defeating Anti-Forensics Techniques
- Module 6. Operating System Forensics
- Module 7. Network Forensics
- Module 8. Investigating Web Attacks
- Module 9. Database Forensics
- Module 10. Cloud Forensics
- Module 11. Malware Forensics
- Module 12. Investigating Email Crimes
- Module 13. Mobile Forensics
- Module 14. Forensics Report Writing and Presentation

Offensive OSCP
Offensive OSCP
- Offensive OSCP 1
- Offensive OSCP 2
- Offensive OSCP 3
- Offensive OSCP 4
- Offensive OSCP 5
- Offensive OSCP 6
- Offensive OSCP 7
Offensive OSCP
- Offensive OSCP 8
- Offensive OSCP 9
- Offensive OSCP 10
- Offensive OSCP 11
- Offensive OSCP 12
- Offensive OSCP 13