Capstone Bachelor Design

(UOP-CYB490.AB1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Ethical and Technical Foundations

  • Goals and Methods
  • Who Should Read This Course?
  • Security Fundamentals
  • Security Testing
  • Hacking Methodologies and Frameworks
  • Hacking Concepts - Hacker and Cracker Descriptions
  • Ethical Hacking Concepts - Ethical Hackers
  • Test Plans - Keeping It Legal
  • Ethics and Legality
  • The Hacking Process
  • The Ethical Hacker’s Process
  • Information System Security Assessment Framework (ISSAF)
  • Penetration Testing Execution Standard (PTES)
  • MITRE ATT&CK Framework
  • Information Security Systems and the Stack
2

Intelligence Gathering

  • Footprinting
  • Scanning
3

Enumeration and System Hacking

  • Enumeration
  • System Hacking Phases and Attack Techniques
  • Establishing Persistence
4

Human and Malware Risk

  • Social Engineering
  • Malware Threats
  • Vulnerability Analysis
5

Network-based Attack Awareness

  • Sniffers
  • Session Hijacking
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS)

1

Ethical and Technical Foundations

  • Searching for Exposed Passwords
  • Examining MITRE ATT&CK
  • Analyzing Captured Packets Using a Sniffer
  • Using the tracert Command
2

Intelligence Gathering

  • Footprinting a Website
  • Performing Passive and Active Reconnaissance
  • Using the whois Program
  • Performing Nmap Scanning
  • Using the curl Command
3

Enumeration and System Hacking

  • Performing Enumeration Using enum4linux, nbtscan, and nmap Scripts
  • Detecting Rootkits
  • Cracking a Linux Password Using John the Ripper
  • Cracking Passwords Using Cain and Abel
  • Managing NTFS Permissions
4

Human and Malware Risk

  • Analyzing Malware Using MetaDefender
  • Analyzing Malware Using VirusTotal
  • Analyzing the WannaCry Ransomware Attack
  • Performing Vulnerability Scanning Using OpenVAS
  • Conducting Vulnerability Scanning using Nessus
5

Network-based Attack Awareness

  • Spoofing a MAC Address
  • Configuring DHCP Snooping
  • Performing ARP Spoofing
  • Performing Session Hijacking Using Burp Suite
  • Simulating a DDoS Attack

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top