Ethical Hacking Training: Beginner To Advanced Specialization

(ETHICAL-HACKING.AB1.0L0)
Lab
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

An Introduction to Ethical Hacking

  • Taking a Full Backup
  • Taking an Incremental Backup
  • Examining Security Policies
  • Searching for Exposed Passwords
2

The Technical Foundations of Hacking

  • Examining MITRE ATT&CK
  • Analyzing Captured Packets Using a Sniffer
  • Using the tracert Command
3

Footprinting, Reconnaissance, Scanning, and Enumeration

  • Performing Passive and Active Reconnaissance
  • Using the whois Program
  • Footprinting a Website
  • Using the curl Command
  • Performing Nmap Scanning
4

Enumeration and System Hacking Attack Techniques

  • Performing Enumeration Using enum4linux, nbtscan, and nmap Scripts
  • Converting an NTFS Partition to FAT32
  • Managing NTFS Permissions
  • Detecting Rootkits
  • Viewing Syslog for Monitoring Logs
  • Cracking a Linux Password Using John the Ripper
  • Cracking Passwords Using Cain and Abel
5

Social Engineering, Malware Threats, and Vulnerability Analysis

  • Performing a Phishing Attack
  • Using Process Explorer
  • Analyzing Malware Using MetaDefender
  • Analyzing Malware Using VirusTotal
  • Generating SHA
  • Analyzing the WannaCry Ransomware Attack
  • Creating RAT
  • Examining Spyware
  • Using the Windows Defender Antivirus
  • Performing Vulnerability Scanning Using OpenVAS
  • Conducting Vulnerability Scanning using Nessus
6

Sniffers, Session Hijacking, and Denial of Services

  • Configuring DHCP Snooping
  • Using TCPdump to Capture Packets
  • Performing ARP Spoofing
  • Spoofing a MAC Address
  • Performing Session Hijacking Using Burp Suite
  • Simulating a DDoS Attack
7

Web Server Hacking, Web Applications, and Database Attacks

  • Exploring ExploitDB and GHDB
  • Performing a Client-Side Attack Using BeEF
  • Fuzzing Using OWASP ZAP
  • Exploiting Windows 7 Using Metasploit
  • Grabbing a Screenshot of a Target Machine Using Metasploit
  • Defending Against a Buffer Overflow Attack
  • Conducting a Cross-Site Request Forgery Attack
  • Attacking a Website Using XSS Injection
  • Performing SQL Injection in DVWA
8

Wireless Technologies, Mobile Security, and Attacks

  • Setting a Secure Passcode on iPhone
  • Setting a Data-Usage Limit
  • Installing an App and Configuring Permission Settings
  • Performing a Factory Reset on an Android Phone
  • Connecting a Printer to a Laptop via Bluetooth
  • Connecting an iPhone to a Laptop via Bluetooth
  • Connecting an iPhone to Wi-Fi
  • Implementing MFA on Mobile Devices
  • Updating iPhone iOS and Security Patches
  • Creating a Home Wireless Network
  • Securing a Wi-Fi Hotspot
9

Evading IDS, Firewalls, and Honeypots

  • Implementing IDS and IPS
  • Using the Hping Tool
  • Configuring NAT
  • Configuring a Network Firewall
  • Setting Up a Honeypot
10

Cryptographic Attacks and Countermeasures

  • Encrypting and Decrypting a File Using OpenSSL
  • Performing Symmetric and Asymmetric Encryption
  • Adding a Digital Certificate
  • Examining PKI Certificates
  • Implementing PGP for Secure Email and File Encryption
  • Using a Digital Signature
  • Hiding Text using Steganography
  • Observing an MD5-Generated Hash Value
  • Observing a SHA256-Generated Hash Value
11

Cloud Computing, IoT, and Botnets

  • Creating a CI/CD Pipeline
  • Creating an IoT Hub in Azure

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top