ETHICAL HACKING

An Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s).
To master the hacking technologies, you will need to become one, but an ethical one! This course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think more like a hacker”.
This Course will help you master Ethical Hacking from scratch. We cater to Beginners and those looking to upgrade your hacking skills. This course will arm you with the knowledge for penetration testing or ethical hacking situations.
It is also impressive to discuss your hacking skills during job interviews ?
NOTE: This course starts at Chapter 7 (Chapters 1-3 teaches FISMA Compliance and 4-7 teaches Security Engineering. Both courses are NOT required to enroll and learn from this course).
Course Features
- Lectures 46
- Quizzes 9
- Skill level All levels
- Language English
- Students 699
- Certificate No
- Assessments Self
-
PHASE 2 - CHAPTER 7 ETHICAL HACKING
- Chapter 7.1 Introduction to Ethical Hacking
- 7.1 Questions
- Chapter 7.2 Active Passive Recon and Scanning
- 7.2 Questions
- Chapter 7.3 Introduction to Netcraft Archive PIPL and HTTRACK
- 7.3 Lab
- Chapter 7.4 Introduction to Maltego
- 7.4 Lab
- Chapter 7.5 Introduction to NAT
- 7.5 Questions
- Chapter 7.6 Metagoofil and Email Tracker
- 7.6 Lab
- chapter 7.7 Nmap Basic Scan (Review)
- 7.7 Lab
- Chapter 7.8 Nmap Scripting Engine
- 7.8 Lab
- Chapter 7.9 Introduction to Malware
- 7.9 Questions
- Chapter 7.10 How to Create a Computer Virus
- 7.10 Lab
-
PHASE 2 - CHAPTER 8 METASPLOIT, VELT AND SHELLTER
- Chapter 8.1 Intro to Metasploit, veil and Shellter
- 8.1 Questions
- Chapter 8.2 Backdoor Preparation OS Update and Veil Install
- Chapter 8.3 Reverse TCP Exploit (backdoor) Using Veil and Mestasploit
- 8.3 Lab
- Chapter 8.4 Reverse TCP (Backdoor) exploit with AV off
- 8.4 Lab
- Chapter 8.5 Backdoor exploit with AV turned on
- 8.5 Lab
- Chapter 8.6 Meterpreter command examples after gaining access
- 8.6 Lab
- Chapter 8.7 Introduction to wireless technology
- 8.7 Questions
- Chapter 8.8 Hacking a Hidden SSID
- 8.8 Lab
-
PHASE 2 - CHAPTER 9 PERSISTENCE CONNECTION AND DHCP
- Chapter 9.1 Intro to Persistence Connection and DHCP
- 9.1 Questions
- Chapter 9.2 Persistence Connection part 1
- 9.2 Lab
- Chapter 9.3 Hacking Pep Talk and explanations
- 9.3 Lab
- Chapter 9.4 Persistence Connection using MOF
- 9.4 Lab
- Chapter 9.5 Intro to Cracking Wireless Security Protocols (WEP, WPA, WPA2)
- 9.5 Questions
- Chapter 9.6 Cracking Wireless (WPA2) Passwords
- 9.6 Lab
-
PHASE 2 - CHAPTER 10 COVERING TRACKS
-
PHASE 3 - CAREER DEVELOPMENT
- Chapter 11 INTRODUCTION TO PHASE 3 – CAREER DEVELOPMENT
- Chapter 11.1 BRIEF DESCRIPTION OF THE MENTORSHIP PROGRAM
- Chapter 11.2 INTRO TO YOUR TRUE-TO-LIFE-PROJECTS
- Chapter 11.3 PROJECT 1 – SYSTEM A&A PROJECT
- CHAPTER 11.4 PROJECT 2 – VULNERABILITY MANAGEMENT INTRODUCTION
- Chapter 11.5 POJECT 2 – VMP – VULNERABILITY ANALYSIS
- Chapter 11.6 PROJECT 2 – VMP – INTRO TO PIVOT TABLES
- Chapter 11.7 PROJECT 2 – VMP – SUBMITTING CHANGE REQUESTS
- Chapter 11.8 PROJECT 2 – VMP – TRACK AND FOLLOW UP ON REMEDIATIONS
- Chapter 11.9 PROJECT 2 – VMP – DRAFT A VULNERABILITY ANALYSIS REPORT
- Chapter 11.10 Part 1 – Intro to Project 3 – SPLUNK App for Windows Infrastructure
- Chapter 11.10.1 Part 2 – Intro to Project 3 – SPLUNK App for Windows Infrastructure
- Chapter 11.11 Pep talk_ Project Expectations
- Chapter 11.12 PROJECT 3 – PLAN AND BUILD YOUR INFRASTRUCTURE FOR DEPLOYMENT
- Chapter 11.13 Project 3 – Creating the SPLUNK service account and configure with group policy
- Chapter 11.14 Project 3 – Install SPLUNK Enterprise and Add the Splunk License
- Chapter 11.15 Project 3 – Set up Basic Infrastructure