• Ethical Hacking Fundamentals
• Kali Linux Lab Setup & Essential Tools
• Passive Reconnaissance
• Active Scanning & Enumeration
• Metasploit Framework
• OWASP Top 10 & Burp Suite
• Linux Privilege Escalation
• Windows Privilege Escalation
• Bypassing Security Controls
• Reporting & Remediation