Ethical Hacking Associate (EHA)
Hacking: The Art of Exploitation
1. Information Fondamentals
2. Network fondamentals
3. Security network protocols
4. Information security torea and attaks
5. Social engineering
6. Hacking Cycle
7. Identification, authentication ancd authorization
8. Cryptography
9. Firewalls
10. Inrusion detection system
11. Data backup
12. Virtual private network
13. Wireless network security
14. Ethical hacking and penetration testing