• COURSES
    • Certified Ethical Hacker – Practical
    • Cyber-Security Career Development Program – Online
    • IT Fundamentals
    • CISSP Boot Camp
    • FISMA Compliance
    • All Courses
  • Program Descriptions
  • Membership
    • Member Services
    • Membership Levels
    • Membership Cancel
    • Membership Billing
  • Page
    • Services
    • Become a Mentor
    • Shop
    • About Us
    • Contact
    • Blog
    • FAQs
    Learn How to Become A Cyber Security Analyst, Class starts 1/18/2021.    Limited seats available.    Sign Up Now
    RegisterLogin
    PJ Cyber-Security SchoolPJ Cyber-Security School
    • COURSES
      • Certified Ethical Hacker – Practical
      • Cyber-Security Career Development Program – Online
      • IT Fundamentals
      • CISSP Boot Camp
      • FISMA Compliance
      • All Courses
    • Program Descriptions
    • Membership
      • Member Services
      • Membership Levels
      • Membership Cancel
      • Membership Billing
    • Page
      • Services
      • Become a Mentor
      • Shop
      • About Us
      • Contact
      • Blog
      • FAQs

      Ethical Hacking

      • Home
      • All courses
      • Ethical Hacking
      • ETHICAL HACKING

      ETHICAL HACKING

      POyelakin
      Ethical Hacking
      (0 review)
      Free
      Buy Membership
      xybee
      • Overview
      • Curriculum
      • Instructor
      • Reviews

      An Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s).

      To master the hacking technologies, you will need to become one, but an ethical one! This course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think more like a hacker”.

      This Course will help you master Ethical Hacking from scratch. We cater to Beginners and those looking to upgrade your hacking skills. This course will arm you with the knowledge for penetration testing or ethical hacking situations.

      It is also impressive to discuss your hacking skills during job interviews ?

      NOTE: This course starts at Chapter 7 (Chapters 1-3 teaches FISMA Compliance and 4-7 teaches Security Engineering. Both courses are NOT required to enroll and learn from this course).

      Course Features

      • Lectures 46
      • Quizzes 9
      • Skill level All levels
      • Language English
      • Students 699
      • Certificate No
      • Assessments Self
      CoursesEthical HackingETHICAL HACKING
      • PHASE 2 - CHAPTER 7 ETHICAL HACKING 20

        • Lecture1.1
          Chapter 7.1 Introduction to Ethical Hacking 05 min
        • Quiz1.1
          7.1 Questions 5 questions
        • Lecture1.2
          Chapter 7.2 Active Passive Recon and Scanning 05 min
        • Quiz1.2
          7.2 Questions 5 questions
        • Lecture1.3
          Chapter 7.3 Introduction to Netcraft Archive PIPL and HTTRACK 06 min
        • Assignment1.1
          7.3 Lab 0 day
        • Lecture1.4
          Chapter 7.4 Introduction to Maltego 06 min
        • Assignment1.2
          7.4 Lab 0 day
        • Lecture1.5
          Chapter 7.5 Introduction to NAT 06 min
        • Quiz1.3
          7.5 Questions 6 questions
        • Lecture1.6
          Chapter 7.6 Metagoofil and Email Tracker 06 min
        • Assignment1.3
          7.6 Lab 0 day
        • Lecture1.7
          chapter 7.7 Nmap Basic Scan (Review) 05 min
        • Assignment1.4
          7.7 Lab 0 day
        • Lecture1.8
          Chapter 7.8 Nmap Scripting Engine 05 min
        • Assignment1.5
          7.8 Lab 0 day
        • Lecture1.9
          Chapter 7.9 Introduction to Malware 04 min
        • Quiz1.4
          7.9 Questions 6 questions
        • Lecture1.10
          Chapter 7.10 How to Create a Computer Virus 06 min
        • Assignment1.6
          7.10 Lab 0 day
      • PHASE 2 - CHAPTER 8 METASPLOIT, VELT AND SHELLTER 15

        • Lecture2.1
          Chapter 8.1 Intro to Metasploit, veil and Shellter 05 min
        • Quiz2.1
          8.1 Questions 5 questions
        • Lecture2.2
          Chapter 8.2 Backdoor Preparation OS Update and Veil Install 05 min
        • Lecture2.3
          Chapter 8.3 Reverse TCP Exploit (backdoor) Using Veil and Mestasploit 06 min
        • Assignment2.1
          8.3 Lab 0 day
        • Lecture2.4
          Chapter 8.4 Reverse TCP (Backdoor) exploit with AV off 04 min
        • Assignment2.2
          8.4 Lab 0 day
        • Lecture2.5
          Chapter 8.5 Backdoor exploit with AV turned on 06 min
        • Assignment2.3
          8.5 Lab 0 day
        • Lecture2.6
          Chapter 8.6 Meterpreter command examples after gaining access 06 min
        • Assignment2.4
          8.6 Lab 0 day
        • Lecture2.7
          Chapter 8.7 Introduction to wireless technology 05 min
        • Quiz2.2
          8.7 Questions 6 questions
        • Lecture2.8
          Chapter 8.8 Hacking a Hidden SSID 06 min
        • Assignment2.5
          8.8 Lab 0 day
      • PHASE 2 - CHAPTER 9 PERSISTENCE CONNECTION AND DHCP 12

        • Lecture3.1
          Chapter 9.1 Intro to Persistence Connection and DHCP 05 min
        • Quiz3.1
          9.1 Questions 6 questions
        • Lecture3.2
          Chapter 9.2 Persistence Connection part 1 04 min
        • Assignment3.1
          9.2 Lab 0 day
        • Lecture3.3
          Chapter 9.3 Hacking Pep Talk and explanations 06 min
        • Assignment3.2
          9.3 Lab 0 day
        • Lecture3.4
          Chapter 9.4 Persistence Connection using MOF 06 min
        • Assignment3.3
          9.4 Lab 0 day
        • Lecture3.5
          Chapter 9.5 Intro to Cracking Wireless Security Protocols (WEP, WPA, WPA2) 05 min
        • Quiz3.2
          9.5 Questions 5 questions
        • Lecture3.6
          Chapter 9.6 Cracking Wireless (WPA2) Passwords 04 min
        • Assignment3.4
          9.6 Lab 0 day
      • PHASE 2 - CHAPTER 10 COVERING TRACKS 10

        • Lecture4.1
          Chapter 10.1 Introduction to Covering Tracks 06 min
        • Quiz4.1
          10.1 Questions 5 questions
        • Lecture4.2
          Chapter 10.2 Clearing event logs 06 min
        • Assignment4.1
          10.2 Lab 0 day
        • Lecture4.3
          Chapter 10.3 Combining your payload with Jpeg 05 min
        • Assignment4.2
          10.3 Lab 0 day
        • Lecture4.4
          Chapter 10.4 Combining your payload with Excel 06 min
        • Assignment4.3
          10.4 Lab 0 day
        • Lecture4.5
          Chapter 10.5 Phishing Wifi Password with Wifiphisher 06 min
        • Assignment4.4
          10.5 Lab 0 day
      • PHASE 3 - CAREER DEVELOPMENT 17

        • Lecture5.1
          Chapter 11 INTRODUCTION TO PHASE 3 – CAREER DEVELOPMENT
        • Lecture5.2
          Chapter 11.1 BRIEF DESCRIPTION OF THE MENTORSHIP PROGRAM
        • Lecture5.3
          Chapter 11.2 INTRO TO YOUR TRUE-TO-LIFE-PROJECTS
        • Lecture5.4
          Chapter 11.3 PROJECT 1 – SYSTEM A&A PROJECT
        • Lecture5.5
          CHAPTER 11.4 PROJECT 2 – VULNERABILITY MANAGEMENT INTRODUCTION
        • Lecture5.6
          Chapter 11.5 POJECT 2 – VMP – VULNERABILITY ANALYSIS
        • Lecture5.7
          Chapter 11.6 PROJECT 2 – VMP – INTRO TO PIVOT TABLES
        • Lecture5.8
          Chapter 11.7 PROJECT 2 – VMP – SUBMITTING CHANGE REQUESTS
        • Lecture5.9
          Chapter 11.8 PROJECT 2 – VMP – TRACK AND FOLLOW UP ON REMEDIATIONS
        • Lecture5.10
          Chapter 11.9 PROJECT 2 – VMP – DRAFT A VULNERABILITY ANALYSIS REPORT
        • Lecture5.11
          Chapter 11.10 Part 1 – Intro to Project 3 – SPLUNK App for Windows Infrastructure
        • Lecture5.12
          Chapter 11.10.1 Part 2 – Intro to Project 3 – SPLUNK App for Windows Infrastructure
        • Lecture5.13
          Chapter 11.11 Pep talk_ Project Expectations
        • Lecture5.14
          Chapter 11.12 PROJECT 3 – PLAN AND BUILD YOUR INFRASTRUCTURE FOR DEPLOYMENT
        • Lecture5.15
          Chapter 11.13 Project 3 – Creating the SPLUNK service account and configure with group policy
        • Lecture5.16
          Chapter 11.14 Project 3 – Install SPLUNK Enterprise and Add the Splunk License
        • Lecture5.17
          Chapter 11.15 Project 3 – Set up Basic Infrastructure
      POyelakin

      Reviews

      Average Rating

      0
      0 rating

      Detailed Rating

      5
      0%
      4
      0%
      3
      0%
      2
      0%
      1
      0%
      • Overview
      • Curriculum
      • Instructor
      • Reviews
      Free
      Buy Membership
      • Share:

      You May Like

      Certified Ethical Hacker – Practical Read More
      POyelakin

      Certified Ethical Hacker - Practical

      1
      0
      $3,000.00 $2,500.00
      Cyber-Security LAB Preparation Read More
      POyelakin

      Cyber-Security LAB Preparation

      215
      0
      Free
      Fundamentals of IT and Cyber-Security Support Read More
      POyelakin

      Fundamentals of IT and Cyber-Security Support

      650
      0
      Free
      CISSP Boot Camp Read More
      Ezenta Nwagwu

      CISSP Boot Camp

      60
      0
      $6,000.00 $3,500.00
      Security+ Boot Camp Read More
      Jerran

      Security+ Boot Camp

      70
      0
      $3,900.00 $2,500.00

      Leave A Reply Cancel reply

      Your email address will not be published. Required fields are marked *

      All Courses

      • Career Development
      • Certification Studies
      • Ethical Hacking
      • IT Foundations
      • Learn Fisma Compliance
      • Live Class
      • Security Compliance
      • Security Engineering

      Latest Courses

      Certified Ethical Hacker – Practical

      Certified Ethical Hacker – Practical

      $3,000.00 $2,500.00
      Cyber-Security LAB Preparation

      Cyber-Security LAB Preparation

      Free
      Fundamentals of IT and Cyber-Security Support

      Fundamentals of IT and Cyber-Security Support

      Free
      301-576-2977
      info@pjpros.com

      8401 Good Luck Rd.
      Rm 202 Lanham, MD 20706

      Facebook-f
      Youtube
      Linkedin
      Twitter
      Instagram

      Company

      • About Us
      • Blog
      • Contact
      • Become a Mentor

      Links

      • Courses
      • Events
      • Gallery
      • FAQs

      Support

      • Member Services
      • Forums
      • Technical Support
      • Billing

      Services

      • Information Security Services
      • IT Project management
      • Cybersecurity Training
      • Mentorship

      © Copyright - PJ Professional IT Services 

      • Privacy
      • Terms

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account

      Are you a member? Login now

      Modal title

      Message modal