Ethical Hacking Training: Beginner To Advanced Specialization

(ETHICAL-HACKING.AB1.0L0)
Lab
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

An Introduction to Ethical Hacking

  • Taking a Full Backup
  • Taking an Incremental Backup
  • Examining Security Policies
  • Searching for Exposed Passwords
2

The Technical Foundations of Hacking

  • Examining MITRE ATT&CK
  • Analyzing Captured Packets Using a Sniffer
  • Using the tracert Command
3

Footprinting, Reconnaissance, Scanning, and Enumeration

  • Performing Passive and Active Reconnaissance
  • Using the whois Program
  • Footprinting a Website
  • Using the curl Command
  • Performing Nmap Scanning
4

Enumeration and System Hacking Attack Techniques

  • Performing Enumeration Using enum4linux, nbtscan, and nmap Scripts
  • Converting an NTFS Partition to FAT32
  • Managing NTFS Permissions
  • Detecting Rootkits
  • Viewing Syslog for Monitoring Logs
  • Cracking a Linux Password Using John the Ripper
  • Cracking Passwords Using Cain and Abel
5

Social Engineering, Malware Threats, and Vulnerability Analysis

  • Performing a Phishing Attack
  • Using Process Explorer
  • Analyzing Malware Using MetaDefender
  • Analyzing Malware Using VirusTotal
  • Generating SHA
  • Analyzing the WannaCry Ransomware Attack
  • Creating RAT
  • Understanding Keyloggers and Spyware
  • Using the Windows Defender Antivirus
  • Performing Vulnerability Scanning Using OpenVAS
  • Conducting Vulnerability Scanning using Nessus
6

Sniffers, Session Hijacking, and Denial of Services

  • Configuring DHCP Snooping
  • Using TCPdump to Capture Packets
  • Performing ARP Spoofing
  • Spoofing a MAC Address
  • Performing Session Hijacking Using Burp Suite
  • Simulating a DDoS Attack
7

Web Server Hacking, Web Applications, and Database Attacks

  • Exploring ExploitDB and GHDB
  • Performing a Client-Side Attack Using BeEF
  • Fuzzing Using OWASP ZAP
  • Exploiting Windows 7 Using Metasploit
  • Grabbing a Screenshot of a Target Machine Using Metasploit
  • Defending Against a Buffer Overflow Attack
  • Conducting a Cross-Site Request Forgery Attack
  • Attacking a Website Using XSS Injection
  • Performing SQL Injection in DVWA
8

Wireless Technologies, Mobile Security, and Attacks

  • Setting a Secure Passcode on iPhone
  • Setting a Data-Usage Limit
  • Installing App and Configuring Permissions Settings
  • Performing Factory Reset on a Android Phone
  • Connecting a Printer to a Laptop via Bluetooth
  • Connecting an iPhone to a Laptop via Bluetooth
  • Connecting an iPhone to Wi-Fi
  • Implementing MFA on Mobile Devices
  • Updating iPhone iOS and Security Patches
  • Creating a Home Wireless Network
  • Securing a Wi-Fi Hotspot
9

Evading IDS, Firewalls, and Honeypots

  • Implementing IDS and IPS
  • Using the Hping Tool
  • Configuring NAT
  • Configuring a Network Firewall
  • Setting Up a Honeypot
10

Cryptographic Attacks and Countermeasures

  • Encrypting and Decrypting a File Using OpenSSL
  • Performing Symmetric and Asymmetric Encryption
  • Adding a Digital Certificate
  • Examining PKI Certificates
  • Implementing PGP for Secure Email and File Encryption
  • Using a Digital Signature
  • Hiding Text using Steganography
  • Observing an MD5-Generated Hash Value
  • Observing a SHA256-Generated Hash Value
11

Cloud Computing, IoT, and Botnets

  • Creating a CI/CD Pipeline
  • Creating an IoT Hub in Azure

Related Courses

All Courses
scroll to top