2017
10 hours
This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques. This course provides step-by-step real-life scenarios. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim, how to assess systems, network security controls, and security posture.
Topics include:
• Lesson 1: Overview of Ethical Hacking and Penetration Testing
• Lesson 2: Kali Linux
• Lesson 3: Passive Reconnaissance
• Lesson 4: Active Reconnaissance
• Lesson 5: Hacking Web Applications
• Lesson 6: Hacking User Credentials
• Lesson 7; Hacking Databases
• Lesson 8: Hacking Networking Devices
• Lesson 9: Fundamentals of Wireless Hacking
• Lesson 10: Buffer Overflows
• Lesson 11: Powershell Attacks
• Lesson 12: Evasion and Post Exploitation Techniques
• Lesson 13: Social Engineering
• Lesson 14: Maintaining Persistence, Pivoting, and Data Exfiltration
• Lesson 15: Writing Penetration Testing Reports