Project Ethical Hacking

(UOP-CYB235.AB2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Information Security and Ethical Hacking Overview

  • Security Fundamentals
  • Security Testing
  • Hacking Methodologies and Frameworks
  • Hacking Concepts - Hacker and Cracker Descriptions
  • Ethical Hacking Concepts - Ethical Hackers
  • Test Plans - Keeping It Legal
  • Ethics and Legality
  • The Hacking Process
  • The Ethical Hacker’s Process
  • Information System Security Assessment Framework (ISSAF)
  • Penetration Testing Execution Standard (PTES)
  • MITRE ATT&CK Framework
  • Information Security Systems and the Stack
2

Reconnaissance Techniques

  • Footprinting
  • Scanning
  • Enumeration
  • System Hacking Phases and Attack Techniques
  • Establishing Persistence
3

System and Network Hacking

  • Social Engineering
  • Malware Threats
  • Vulnerability Analysis
  • Sniffers
  • Session Hijacking
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS)
4

Web Application and Wireless Network Hacking

  • Web Server Hacking
  • Web Application Hacking
  • Database Hacking
  • Wireless and Mobile Device Technologies
  • Wi-Fi
  • Signs of Router/Wi-Fi Hacking
  • Prevent Wi-Fi Hacking
  • Wi-Fi Hacked - What To Do?
5

Cryptography and Cloud Computing

  • Intrusion Detection and Prevention Systems
  • Firewalls
  • Evading NAC and Endpoint Security
  • Mitigation for NAC Evasion
  • IDS/Firewall Evasion Countermeasures
  • Honeypots
  • Cryptography History and Concepts
  • Encryption Algorithms
  • Public Key Infrastructure
  • Email and Disk Encryption
  • Cryptanalysis Tools and Attacks
  • Security Protocols and Countermeasures
  • Cloud Computing
  • Cloud Security
  • IoT
  • Botnets

1

Information Security and Ethical Hacking Overview

  • Examining Security Policies
  • Searching for Exposed Passwords
  • Examining MITRE ATT&CK
  • Analyzing Captured Packets Using a Sniffer
  • Using the tracert Command
2

Reconnaissance Techniques

  • Footprinting a Website
  • Performing Passive and Active Reconnaissance
  • Performing Nmap Scanning
  • Performing Enumeration Using enum4linux, nbtscan, and nmap Scripts
  • Cracking a Linux Password Using John the Ripper
3

System and Network Hacking

  • Performing Vulnerability Scanning Using OpenVAS
  • Conducting Vulnerability Scanning using Nessus
  • Configuring DHCP Snooping
  • Using TCPdump to Capture Packets
  • Performing ARP Spoofing
  • Simulating a DDoS Attack
4

Web Application and Wireless Network Hacking

  • Installing an App and Configuring Permission Settings
  • Implementing MFA on Mobile Devices
  • Setting a Secure Passcode on iPhone
  • Updating iPhone iOS and Security Patches
  • Creating a Home Wireless Network
  • Securing a Wi-Fi Hotspot
5

Cryptography and Cloud Computing

  • Performing Symmetric and Asymmetric Encryption
  • Encrypting and Decrypting a File Using OpenSSL
  • Examining PKI Certificates
  • Implementing PGP for Secure Email and File Encryption
  • Using a Digital Signature

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top