Ethical Hacking Training: Beginner To Advanced Specialization Course

(ETHICAL-HACKING.AB1.E0T)
Lessons
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Introduction

  • Goals and Methods
  • Who Should Read This Course?
  • Strategies for Exam Preparation
  • How This Course Is Organized
2

An Introduction to Ethical Hacking

  • Security Fundamentals
  • Security Testing
  • Hacking Methodologies and Frameworks
  • Hacking Concepts - Hacker and Cracker Descriptions
  • Ethical Hacking Concepts - Ethical Hackers
  • Test Plans - Keeping It Legal
  • Ethics and Legality
  • Summary
  • Review All Key Topics
  • Exercises
3

The Technical Foundations of Hacking

  • The Hacking Process
  • The Ethical Hacker’s Process
  • Information System Security Assessment Framework (ISSAF)
  • Penetration Testing Execution Standard (PTES)
  • MITRE ATT&CK Framework
  • Information Security Systems and the Stack
  • Summary
  • Review All Key Topics
  • Exercises
4

Footprinting, Reconnaissance, Scanning, and Enumeration

  • Footprinting
  • Scanning
  • Summary
  • Review All Key Topics
  • Exercises
5

Enumeration and System Hacking Attack Techniques

  • Enumeration
  • System Hacking Phases and Attack Techniques
  • Establishing Persistence
  • Summary
  • Review All Key Topics
  • Exercise
6

Social Engineering, Malware Threats, and Vulnerability Analysis

  • Social Engineering
  • Malware Threats
  • Vulnerability Analysis
  • Summary
  • Review All Key Topics
  • Exercises
7

Sniffers, Session Hijacking, and Denial of Services

  • Sniffers
  • Session Hijacking
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS)
  • Summary
  • Review All Key Topics
  • Exercises
8

Web Server Hacking, Web Applications, and Database Attacks

  • Web Server Hacking
  • Web Application Hacking
  • Database Hacking
  • Summary
  • Review All Key Topics
  • Exercise
9

Wireless Technologies, Mobile Security, and Attacks

  • Wireless and Mobile Device Technologies
  • Wi-Fi
  • Signs of Router/Wi-Fi Hacking
  • Prevent Wi-Fi Hacking
  • Wi-Fi Hacked - What To Do?
  • Summary
  • Review All Key Topics
  • Questions
10

Evading IDS, Firewalls, and Honeypots

  • Intrusion Detection and Prevention Systems
  • Firewalls
  • Evading NAC and Endpoint Security
  • Mitigation for NAC Evasion
  • IDS/Firewall Evasion Countermeasures
  • Honeypots
  • Summary
  • Review All Key Topics
11

Cryptographic Attacks and Countermeasures

  • Cryptography History and Concepts
  • Encryption Algorithms
  • Public Key Infrastructure
  • Email and Disk Encryption
  • Cryptanalysis Tools and Attacks
  • Security Protocols and Countermeasures
  • Summary
  • Review All Key Topics
  • Exercises
12

Cloud Computing, IoT, and Botnets

  • Cloud Computing
  • Cloud Security
  • IoT
  • Botnets
  • Summary
  • Review All Key Topics

Related Courses

All Courses
scroll to top