Formulate a deep understanding about Ethical Hacking including networking basics, information security, hack value, doxing, etc. Understand the types and phases of hacking and information security controls Foot printing through Search engines and social networking sites