# [FORGOTTEN] CISCO DIVD Academy Ethical Hacker

Learn the art of offensive security to uncover cyber threats and vulnerabilities before the cybercriminals do.  
SCHEDULE  
Aug 27, 2023 - Aug 30, 2024  
Languages  
English  
Instructor  
Victor Gevers  
https://skillsforall.com/launch?id=80c156bc-84a4-47c9-a233-5eafe7bdde82&amp;tab=curriculum&amp;view=a2f2eff1-791f-5595-8680-4a3b27778d2e

# overview

<div class="courseBanner--g4799" id="bkmrk-arn-the-art-of-offen"><div class="row"><div class="col-md-12 col-lg-7 order-lg-1"><div class="courseDetails--mQUEW dbl-margin-right"><div><div><div class="desClass--tBsPv desView--0CZKq base-margin-top" title="Learn the art of offensive security to uncover cyber threats and vulnerabilities before the cybercriminals do."><div class="article__title">  
i started ripping this course on August 30th of 2023 </div><div class="article__title">so some things may be a bit different if you take the course</div><div class="article__title">[https://skillsforall.com/course/ethical-hacker?courseLang=en-US](https://skillsforall.com/course/ethical-hacker?courseLang=en-US)  
---

<div class="article__title-inner"></div></div></div><div class="desClass--tBsPv desView--0CZKq base-margin-top" title="Learn the art of offensive security to uncover cyber threats and vulnerabilities before the cybercriminals do.">arn the art of offensive security to uncover cyber threats and vulnerabilities before the cybercriminals do.</div></div></div><div class="courseBannerBottom--YOcDd"><div class="row"><div class="courseBottomItem--WyBZs col"><div class="courseAttributeTitle--2HFQ1">SCHEDULEL: Aug 27, 2023 - Aug 30, 2024</div></div><div class="courseBottomItem--WyBZs col"><div class="courseAttributeTitle--2HFQ1">Language: English</div></div><div class="col"><div class="courseAttributeTitle--2HFQ1">Instructor: Victor Gevers</div></div></div></div></div></div></div></div><div class="tabContentWrapper--ozRIX" id="bkmrk-70-hours-intermediat"><div class="b2c_containerPadding--mLGeD"><div class="row"><div class="col-md-12 col-lg-5 order-lg-2"><div class="attributesContainer--oYfeK"><div class="attributesBlock--JQTfV"><div class="flex flex-wrap flex-between"><div class="attrBlock--I-etM">Estimated ammount of time required to complete: 70 Hours</div><div class="attrBlock--I-etM"><div class="attrTitle--yC95w">difficulty: Intermediate</div></div><div class="attrBlock--I-etM"><div class="attrTitle--yC95w">Number of labs: 34  
</div></div><div class="attrBlock--I-etM">pacing: Self-Paced</div></div></div>---

<div class="badgeContainer--329SZ">  
</div></div></div></div></div></div>### Instructor

<div class="tabContentWrapper--ozRIX" id="bkmrk-victor-gevers-overvi"><div class="b2c_containerPadding--mLGeD"><div class="row"><div class="col-md-12 col-lg-5 order-lg-2"><div class="attributesContainer--oYfeK"><div class="instructorBlock--SCneA">- <div class="flex flex-middle">![Victor Gevers](https://library.naruzkurai.com/uploads/images/gallery/2023-08/embedded-image-onlwu0np.png "Victor Gevers")<div class="staffName--ZBGOv text-size-16 text-bold base-margin-left">Victor Gevers</div></div>

</div></div></div><div class="col-md-12 col-lg-7 order-lg-1"><div class="tabBlock--nxVmH">- [<span class="tablink-inner">Overview</span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)
- [<span class="tablink-inner">Curriculum</span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)
- [<span class="tablink-inner">Resources</span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)

</div><div class="dbl-margin-top dbl-margin-bottom"><div><div class="dbl-margin-top text-size-12"><div><div><div id="bkmrk-the-digital-landscap">---

<span id="bkmrk-the-digital-landscap-1">The digital landscape is evolving at an unprecedented rate and cyber threats lurk around every corner. Cybersecurity resilience in the modern world cannot be just an add on - it's a necessity. Offensive security professionals like ethical hackers and penetration testers can help proactively discover unknown threats and address them before the cybercriminals do.   
  
This course is designed to prepare you with an Ethical Hacker skillset and give you a solid understanding of offensive security. You will become proficient in the art of scoping, executing, and reporting on vulnerability assessments, while recommending mitigation strategies. Follow an engaging gamified narrative throughout the course and get lots of practice with hands-on labs inspired by real-world scenarios.  
  
After completing this course, continue your cybersecurity career in offensive security as an ethical hacker or penetration tester. Or use this course to strengthen your defensive security knowledge. By understanding the mindset of threat actors, you will be able to more effectively implement security controls and monitor, analyze, and respond to current security threats.  
  
**Prerequisites:**   
[Junior Cybersecurity Analyst Career Path](https://skillsforall.com/career-path/cybersecurity), or equivalent entry-level cybersecurity knowledge  
Basic programming knowledge  
</span></div><div>---

<div class="dbl-margin-top dbl-margin-bottom" id="bkmrk-what-you-will-learn."><div class="curriculumLearnLabel--YF99k">what you will learn.</div><div class="outlineContainer--xvcq6"><div class="nodeList--0Un1k viewOnlyMode--JU0N0 courseLaunch--qwId5"><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ"></div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Course Introduction</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active"></div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height:50em;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="Course Introduction">Course Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="Welcome to the Ethical Hacker Course">Welcome to the Ethical Hacker Course</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="The Fictional Companies in the Ethical Hacker Course">The Fictional Companies in the Ethical Hacker Course</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="What Will I Learn in This Course?">What Will I Learn in This Course?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="Ethical Hacking Statement">Ethical Hacking Statement</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/c929ed57-ee07-44ad-a2d4-7229fc85e043.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 1: Introduction to Ethical Hacking and Penetration Testing</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active"></div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height:1600px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="1.0. Introduction">1.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.0.1 Why Should I Take This Module?">1.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="1.0.2 What Will I Learn in This Module?">1.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="1.1. Understanding Ethical Hacking and Penetration Testing">1.1. Understanding Ethical Hacking and Penetration Testing</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.1.1 Overview">1.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.1.2 Why Do We Need to Do Penetration Testing?">1.1.2 Why Do We Need to Do Penetration Testing?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.1.3 Lab - Researching PenTesting Careers">1.1.3 Lab - Researching PenTesting Careers</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="1.1.4 Threat Actors">1.1.4 Threat Actors</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="1.2. Exploring Penetration Testing Methodologies">1.2. Exploring Penetration Testing Methodologies</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.2.1 Overview">1.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.2.2 Why Do We Need to Follow a Methodology for Penetration Testing?">1.2.2 Why Do We Need to Follow a Methodology for Penetration Testing?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.2.3 Environmental Considerations">1.2.3 Environmental Considerations</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.2.4 Practice - Types of Penetration Tests">1.2.4 Practice - Types of Penetration Tests</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.2.5 Surveying Different Standards and Methodologies">1.2.5 Surveying Different Standards and Methodologies</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="1.2.6 Lab - Compare Pentesting Methodologies">1.2.6 Lab - Compare Pentesting Methodologies</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="1.3. Building Your Own Lab">1.3. Building Your Own Lab</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.3.1 Overview">1.3.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.3.2 Requirements and Guidelines for Penetration Testing Labs">1.3.2 Requirements and Guidelines for Penetration Testing Labs</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.3.3 What Tools Should You Use in Your Lab?">1.3.3 What Tools Should You Use in Your Lab?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.3.4 Practice - Requirements and Guidelines for Penetration Testing Labs">1.3.4 Practice - Requirements and Guidelines for Penetration Testing Labs</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.3.5 What If You Break Something?">1.3.5 What If You Break Something?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.3.6 Lab - Deploy a Pre-Built Kali Linux Virtual Machine (VM)">1.3.6 Lab - Deploy a Pre-Built Kali Linux Virtual Machine (VM)</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="1.3.7 Lab - Investigate Kali Linux">1.3.7 Lab - Investigate Kali Linux</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="1.4. Summary">1.4. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.4.1 What Did I Learn in this Module?">1.4.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="1.4.2 Reflection Questions">1.4.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="1.4.3 Quiz - Introduction to Ethical Hacking and Penetration Testing">1.4.3 Quiz - Introduction to Ethical Hacking and Penetration Testing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/9e20fed5-aa76-4202-9903-ef71db5cbc24.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 2: Planning and Scoping a Penetration Testing Assessment</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active"></div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height:1850px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="2.0. Introduction">2.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.0.1 Why Should I Take This Module?">2.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="2.0.2 What Will I Learn in This Module?">2.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="2.1. Comparing and Contrasting Governance, Risk, and Compliance Concepts">2.1. Comparing and Contrasting Governance, Risk, and Compliance Concepts</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.1.1 Overview">2.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.1.2 Regulatory Compliance Considerations">2.1.2 Regulatory Compliance Considerations</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.1.3 Local Restrictions">2.1.3 Local Restrictions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.1.4 Practice - Regulations">2.1.4 Practice - Regulations</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.1.5 Legal Concepts">2.1.5 Legal Concepts</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.1.6 Contracts">2.1.6 Contracts</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.1.7 Disclaimers">2.1.7 Disclaimers</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.1.8 Practice - Legal Concepts">2.1.8 Practice - Legal Concepts</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="2.1.9 Lab - Compliance Requirements and Local Restrictions">2.1.9 Lab - Compliance Requirements and Local Restrictions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="2.2. Explaining the Importance of Scoping and Organizational or Customer Requirements">2.2. Explaining the Importance of Scoping and Organizational or Customer Requirements</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.2.1 Overview">2.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.2.2 Rules of Engagement">2.2.2 Rules of Engagement</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.2.3 Practice - Rules of Engagement">2.2.3 Practice - Rules of Engagement</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.2.4 Target List and In-Scope Assets">2.2.4 Target List and In-Scope Assets</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.2.5 Practice - Target List and In-Scope Assets">2.2.5 Practice - Target List and In-Scope Assets</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.2.6 Validating the Scope of Engagement">2.2.6 Validating the Scope of Engagement</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.2.7 Strategy: Unknown vs. Known Environment Testing">2.2.7 Strategy: Unknown vs. Known Environment Testing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.2.8 Practice - Strategy: Unknown vs. Known Environment Testing">2.2.8 Practice - Strategy: Unknown vs. Known Environment Testing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.2.9 Lab - Pre-Engagement Scope and Planning">2.2.9 Lab - Pre-Engagement Scope and Planning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="2.2.10 Lab - Create a Pentesting Agreement">2.2.10 Lab - Create a Pentesting Agreement</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="2.3. Demonstrating an Ethical Hacking Mindset by Maintaining Professionalism and Integrity">2.3. Demonstrating an Ethical Hacking Mindset by Maintaining Professionalism and Integrity</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.3.1 Overview">2.3.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.3.2 Practice - Demonstrate an Ethical Hacking Mindset">2.3.2 Practice - Demonstrate an Ethical Hacking Mindset</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="2.3.3 Lab - Personal Code of Conduct">2.3.3 Lab - Personal Code of Conduct</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="2.4. Summary">2.4. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.4.1 What Did I Learn in this Module?">2.4.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="2.4.2 Reflection Questions">2.4.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="2.4.3 Quiz - Planning and Scoping a Penetration Testing Assessment">2.4.3 Quiz - Planning and Scoping a Penetration Testing Assessment</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/2356c61c-147f-48ab-acd2-cf0c9ed70aae.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 3: Information Gathering and Vulnerability Scanning</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active"></div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height:2950px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="3.0. Introduction">3.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.0.1 Why Should I Take This Module?">3.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="3.0.2 What Will I Learn in This Module?">3.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="3.1. Performing Passive Reconnaissance">3.1. Performing Passive Reconnaissance</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.1 Overview">3.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.2 Active Reconnaissance vs. Passive Reconnaissance">3.1.2 Active Reconnaissance vs. Passive Reconnaissance</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.3 Practice - Active Reconnaissance vs. Passive Reconnaissance">3.1.3 Practice - Active Reconnaissance vs. Passive Reconnaissance</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.4 Lab - Using OSINT Tools">3.1.4 Lab - Using OSINT Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.5 DNS Lookups">3.1.5 DNS Lookups</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.6 Practice - DNS Lookups">3.1.6 Practice - DNS Lookups</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.7 Identification of Technical and Administrative Contacts">3.1.7 Identification of Technical and Administrative Contacts</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.8 Practice - Identification of Technical and Administrative Contracts">3.1.8 Practice - Identification of Technical and Administrative Contracts</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.9 Lab - DNS Lookups">3.1.9 Lab - DNS Lookups</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.10 Cloud vs. Self-Hosted Applications and Related Subdomains">3.1.10 Cloud vs. Self-Hosted Applications and Related Subdomains</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.11 Social Media Scraping">3.1.11 Social Media Scraping</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.12 Lab - Employee Intelligence Gathering">3.1.12 Lab - Employee Intelligence Gathering</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.13 Cryptographic Flaws">3.1.13 Cryptographic Flaws</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.14 Lab - Finding Information from SSL Certificates">3.1.14 Lab - Finding Information from SSL Certificates</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.15 Company Reputation and Security Posture">3.1.15 Company Reputation and Security Posture</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.16 Practice - File Metadata">3.1.16 Practice - File Metadata</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.17 Practice - Web Archiving, Caching, and Public Code Repositories">3.1.17 Practice - Web Archiving, Caching, and Public Code Repositories</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.18 Lab - Finding Out About the Organization">3.1.18 Lab - Finding Out About the Organization</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.19 Lab - Advanced Searches">3.1.19 Lab - Advanced Searches</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.20 Open-Source Intelligence (OSINT) Gathering">3.1.20 Open-Source Intelligence (OSINT) Gathering</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="3.1.21 Lab - Shodan Searches">3.1.21 Lab - Shodan Searches</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="3.2. Performing Active Reconnaissance">3.2. Performing Active Reconnaissance</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.2.1 Overview">3.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.2.2 Nmap Scan Types">3.2.2 Nmap Scan Types</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.2.3 Practice - Nmap Scan Types">3.2.3 Practice - Nmap Scan Types</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.2.4 Types of Enumeration">3.2.4 Types of Enumeration</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.2.5 Practice - Exploring Enumeration via Packet Crafting with Scapy">3.2.5 Practice - Exploring Enumeration via Packet Crafting with Scapy</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.2.6 Lab - Enumeration with Nmap">3.2.6 Lab - Enumeration with Nmap</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.2.7 Packet Inspection and Eavesdropping">3.2.7 Packet Inspection and Eavesdropping</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.2.8 Practice - Packet Inspection and Eavesdropping">3.2.8 Practice - Packet Inspection and Eavesdropping</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.2.9 Lab - Packet Crafting with Scapy">3.2.9 Lab - Packet Crafting with Scapy</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="3.2.10 Lab - Network Sniffing with Wireshark">3.2.10 Lab - Network Sniffing with Wireshark</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="3.3. Understanding the Art of Performing Vulnerability Scans">3.3. Understanding the Art of Performing Vulnerability Scans</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.3.1 Overview">3.3.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.3.2 How a Typical Automated Vulnerability Scanner Works">3.3.2 How a Typical Automated Vulnerability Scanner Works</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.3.3 Practice - How a Typical Automated Vulnerability Scanner Works">3.3.3 Practice - How a Typical Automated Vulnerability Scanner Works</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.3.4 Types of Vulnerability Scans">3.3.4 Types of Vulnerability Scans</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.3.5 Practice - Types of Vulnerability Scans">3.3.5 Practice - Types of Vulnerability Scans</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.3.6 Lab - Vulnerability Scanning with Kali Tools">3.3.6 Lab - Vulnerability Scanning with Kali Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="3.3.7 Challenges to Consider When Running a Vulnerability Scan">3.3.7 Challenges to Consider When Running a Vulnerability Scan</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="3.4. Understanding How to Analyze Vulnerability Scan Results">3.4. Understanding How to Analyze Vulnerability Scan Results</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.4.1 Overview">3.4.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.4.2 Sources for Further Investigation of Vulnerabilities">3.4.2 Sources for Further Investigation of Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.4.3 Lab - Investigate Vulnerability Information Sources">3.4.3 Lab - Investigate Vulnerability Information Sources</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="3.4.4 How to Deal with a Vulnerability">3.4.4 How to Deal with a Vulnerability</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="3.5. Summary">3.5. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.5.1 What Did I Learn in this Module?">3.5.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="3.5.2 Reflection Questions">3.5.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="3.5.3 Quiz - Information Gathering and Vulnerability Scanning">3.5.3 Quiz - Information Gathering and Vulnerability Scanning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/42172e76-b06c-425c-a159-fab770abd18b.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 4: Social Engineering Attacks</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active"></div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height:2250px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="4.0. Introduction">4.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.0.1 Why Should I Take This Module?">4.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="4.0.2 What Will I Learn in This Module?">4.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="4.1. Pretexting for an Approach and Impersonation">4.1. Pretexting for an Approach and Impersonation</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.1.1 Overview">4.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="4.1.2 Practice - Pretexting and Impersonation">4.1.2 Practice - Pretexting and Impersonation</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="4.2. Social Engineering Attacks">4.2. Social Engineering Attacks</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.2.1 Overview">4.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.2.2 Email Phishing">4.2.2 Email Phishing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.2.3 Vishing">4.2.3 Vishing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.2.4 Short Message Service (SMS) Phishing">4.2.4 Short Message Service (SMS) Phishing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.2.5 Universal Serial Bus (USB) Drop Key">4.2.5 Universal Serial Bus (USB) Drop Key</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.2.6 Watering Hole Attacks">4.2.6 Watering Hole Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.2.7 Practice - Pivot Attack">4.2.7 Practice - Pivot Attack</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="4.2.8 Practice - Social Engineering Attacks">4.2.8 Practice - Social Engineering Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="4.3. Physical Attacks">4.3. Physical Attacks</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.3.1 Overview">4.3.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.3.2 Tailgating">4.3.2 Tailgating</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.3.3 Dumpster Diving">4.3.3 Dumpster Diving</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.3.4 Shoulder Surfing">4.3.4 Shoulder Surfing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.3.5 Badge Cloning">4.3.5 Badge Cloning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="4.3.6 Practice - Physical Attacks">4.3.6 Practice - Physical Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="4.4. Social Engineering Tools">4.4. Social Engineering Tools</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.4.1 Overview">4.4.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.4.2 Social-Engineer Toolkit (SET)">4.4.2 Social-Engineer Toolkit (SET)</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.4.3 Browser Exploitation Framework (BeEF)">4.4.3 Browser Exploitation Framework (BeEF)</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.4.4 Practice - Browser Exploitation Framework">4.4.4 Practice - Browser Exploitation Framework</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.4.5 Call Spoofing Tools">4.4.5 Call Spoofing Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.4.6 Practice - Call Spoofing Tools">4.4.6 Practice - Call Spoofing Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.4.7 Lab - Explore the Social Engineer Toolkit (SET)">4.4.7 Lab - Explore the Social Engineer Toolkit (SET)</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="4.4.8 Lab - Using the Browser Exploitation Framework (BeEF)">4.4.8 Lab - Using the Browser Exploitation Framework (BeEF)</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="4.5. Methods of Influence">4.5. Methods of Influence</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.5.1 Overview">4.5.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="4.5.2 Practice - Methods of Influence">4.5.2 Practice - Methods of Influence</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="4.6. Summary">4.6. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.6.1 What Did I Learn in this Module?">4.6.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="4.6.2 Reflection Questions">4.6.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="4.6.3 Quiz - Social Engineering Attacks">4.6.3 Quiz - Social Engineering Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/387e65fb-148f-4e22-93ce-0516bee9175e.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 5: Exploiting Wired and Wireless Networks</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active"></div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height:2750px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="5.0. Introduction">5.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.0.1 Why Should I Take This Module?">5.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="5.0.2 What Will I Learn in This Module?">5.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="5.1. Exploiting Network-Based Vulnerabilities">5.1. Exploiting Network-Based Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.1 Overview">5.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.2 Windows Name Resolution and SMB Attacks">5.1.2 Windows Name Resolution and SMB Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.3 Practice - Windows Name Resolution and SMB Attacks">5.1.3 Practice - Windows Name Resolution and SMB Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.4 Lab - Scanning for SMB Vulnerabilities with enum4linux">5.1.4 Lab - Scanning for SMB Vulnerabilities with enum4linux</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.5 DNS Cache Poisoning">5.1.5 DNS Cache Poisoning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.6 Practice - DNS Cache Poisoning">5.1.6 Practice - DNS Cache Poisoning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.7 SNMP Exploits">5.1.7 SNMP Exploits</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.8 SMTP Exploits">5.1.8 SMTP Exploits</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.9 Practice - SMTP Commands">5.1.9 Practice - SMTP Commands</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.10 FTP Exploits">5.1.10 FTP Exploits</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.11 Pass-the-Hash Attacks">5.1.11 Pass-the-Hash Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.12 Kerberos and LDAP-Based Attacks">5.1.12 Kerberos and LDAP-Based Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.13 Kerberoasting">5.1.13 Kerberoasting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.14 On-Path Attacks">5.1.14 On-Path Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.15 Practice - Kerberos, LDAP, and On-Path Attacks">5.1.15 Practice - Kerberos, LDAP, and On-Path Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.16 Lab - On-Path Attacks with Ettercap">5.1.16 Lab - On-Path Attacks with Ettercap</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.17 Route Manipulation Attacks">5.1.17 Route Manipulation Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.18 DoS and DDoS Attacks">5.1.18 DoS and DDoS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.19 Practice - DoS and DDoS Attacks">5.1.19 Practice - DoS and DDoS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.20 Network Access Control (NAC) Bypass">5.1.20 Network Access Control (NAC) Bypass</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.21 VLAN Hopping">5.1.21 VLAN Hopping</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.22 Practice - NAC Bypass and VLAN Hopping">5.1.22 Practice - NAC Bypass and VLAN Hopping</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.23 DHCP Starvation Attacks and Rogue DHCP Servers">5.1.23 DHCP Starvation Attacks and Rogue DHCP Servers</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="5.1.24 Practice - DHCP Starvation and Rogue DHCP Servers">5.1.24 Practice - DHCP Starvation and Rogue DHCP Servers</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="5.2. Exploiting Wireless Vulnerabilities">5.2. Exploiting Wireless Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.1 Overview">5.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.2 Rogue Access Points">5.2.2 Rogue Access Points</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.3 Evil Twin Attacks">5.2.3 Evil Twin Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.4 Disassociation (or Deauthentication) Attacks">5.2.4 Disassociation (or Deauthentication) Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.5 Preferred Network List Attacks">5.2.5 Preferred Network List Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.6 Wireless Signal Jamming and Interference">5.2.6 Wireless Signal Jamming and Interference</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.7 War Driving">5.2.7 War Driving</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.8 Initialization Vector (IV) Attacks and Unsecured Wireless Protocols">5.2.8 Initialization Vector (IV) Attacks and Unsecured Wireless Protocols</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.9 KARMA Attacks">5.2.9 KARMA Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.10 Fragmentation Attacks">5.2.10 Fragmentation Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.11 Practice - IV, Unsecured Wireless, KARMA, and Fragmentation Attacks">5.2.11 Practice - IV, Unsecured Wireless, KARMA, and Fragmentation Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.12 Credential Harvesting">5.2.12 Credential Harvesting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.13 Bluejacking and Bluesnarfing">5.2.13 Bluejacking and Bluesnarfing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.14 Bluetooth Low Energy (BLE) Attacks">5.2.14 Bluetooth Low Energy (BLE) Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.15 Radio-Frequency Identification (RFID) Attacks">5.2.15 Radio-Frequency Identification (RFID) Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.16 Password Spraying">5.2.16 Password Spraying</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.17 Exploit Chaining">5.2.17 Exploit Chaining</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="5.2.18 Practice - Wireless Attacks">5.2.18 Practice - Wireless Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="5.3. Summary">5.3. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.3.1 What Did I Learn in this Module?">5.3.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="5.3.2 Reflection Questions">5.3.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="5.3.3 Quiz - Exploiting Wired and Wireless Networks">5.3.3 Quiz - Exploiting Wired and Wireless Networks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/ae18768b-d407-407a-8033-8102f34cc278.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 6: Exploiting Application-Based Vulnerabilities</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active"></div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height:4750px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.0. Introduction">6.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.0.1 Why Should I Take This Module?">6.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.0.2 What Will I Learn in This Module?">6.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.1. Overview of Web Application-Based Attacks for Security Professionals and the OWASP Top 10">6.1. Overview of Web Application-Based Attacks for Security Professionals and the OWASP Top 10</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.1.1 Overview">6.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.1.2 The HTTP Protocol">6.1.2 The HTTP Protocol</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.1.3 Practice - The HTTP Protocol">6.1.3 Practice - The HTTP Protocol</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.1.4 Web Sessions">6.1.4 Web Sessions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.1.5 Practice - Web Sessions">6.1.5 Practice - Web Sessions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.1.6 OWASP Top 10">6.1.6 OWASP Top 10</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.1.7 Lab - Website Vulnerability Scanning">6.1.7 Lab - Website Vulnerability Scanning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.1.8 Lab - Using the GVM Vulnerability Scanner">6.1.8 Lab - Using the GVM Vulnerability Scanner</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.2. How to Build Your Own Web Application Lab">6.2. How to Build Your Own Web Application Lab</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.2.1 Overview">6.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.3. Understanding Business Logic Flaws">6.3. Understanding Business Logic Flaws</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.3.1 Overview">6.3.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.3.2 Practice - Business Logic Flaws">6.3.2 Practice - Business Logic Flaws</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.4. Understanding Injection-Based Vulnerabilities">6.4. Understanding Injection-Based Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.4.1 Overview">6.4.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.4.2 SQL Injection Vulnerabilities">6.4.2 SQL Injection Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.4.3 Practice - SQL Injection Attacks">6.4.3 Practice - SQL Injection Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.4.4 Command Injection Vulnerabilities">6.4.4 Command Injection Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.4.5 Practice - Command Injection Vulnerabilities">6.4.5 Practice - Command Injection Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.4.6 Lightweight Directory Access Protocol (LDAP) Injection Vulnerabilities">6.4.6 Lightweight Directory Access Protocol (LDAP) Injection Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.4.7 Lab - Injection Attacks">6.4.7 Lab - Injection Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.5. Exploiting Authentication-Based Vulnerabilities">6.5. Exploiting Authentication-Based Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.5.1 Overview">6.5.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.5.2 Session Hijacking">6.5.2 Session Hijacking</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.5.3 Practice - Session Hijacking">6.5.3 Practice - Session Hijacking</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.5.4 Redirect Attacks">6.5.4 Redirect Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.5.5 Default Credentials">6.5.5 Default Credentials</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.5.6 Kerberos Vulnerabilities">6.5.6 Kerberos Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.5.7 Practice - Kerberos Vulnerabilities">6.5.7 Practice - Kerberos Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.5.8 Lab - Using Password Tools">6.5.8 Lab - Using Password Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.6. Exploiting Authorization-Based Vulnerabilities">6.6. Exploiting Authorization-Based Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.6.1 Overview">6.6.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.6.2 Parameter Pollution">6.6.2 Parameter Pollution</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.6.3 Practice - Parameter Pollution">6.6.3 Practice - Parameter Pollution</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.6.4 Insecure Direct Object Reference Vulnerabilities">6.6.4 Insecure Direct Object Reference Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.6.5 Practice - Insecure Direct Object Reference Vulnerabilities">6.6.5 Practice - Insecure Direct Object Reference Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.7. Understanding Cross-Site Scripting (XSS) Vulnerabilities">6.7. Understanding Cross-Site Scripting (XSS) Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.7.1 Overview">6.7.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.7.2 Reflected XSS Attacks">6.7.2 Reflected XSS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.7.3 Practice - Reflected XSS Attacks">6.7.3 Practice - Reflected XSS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.7.4 Stored XSS Attacks">6.7.4 Stored XSS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.7.5 Practice - Stored XSS Attacks">6.7.5 Practice - Stored XSS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.7.6 XSS Evasion Techniques">6.7.6 XSS Evasion Techniques</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.7.7 XSS Mitigations">6.7.7 XSS Mitigations</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.7.8 Lab - Cross Site Scripting">6.7.8 Lab - Cross Site Scripting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.8. Understanding Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery Attacks">6.8. Understanding Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery Attacks</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.8.1 Overview">6.8.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.8.2 Practice - CSRF/XSRF Attacks">6.8.2 Practice - CSRF/XSRF Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.9. Understanding Clickjacking">6.9. Understanding Clickjacking</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.9.1 Overview">6.9.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.10. Exploiting Security Misconfigurations">6.10. Exploiting Security Misconfigurations</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.10.1 Overview">6.10.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.10.2 Exploiting Directory Traversal Vulnerabilities">6.10.2 Exploiting Directory Traversal Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.10.3 Practice - Directory Transversal">6.10.3 Practice - Directory Transversal</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.10.4 Cookie Manipulation Attacks">6.10.4 Cookie Manipulation Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.11. Exploiting File Inclusion Vulnerabilities">6.11. Exploiting File Inclusion Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.11.1 Overview">6.11.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.11.2 Local File Inclusion Vulnerabilities">6.11.2 Local File Inclusion Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.11.3 Remote File Inclusion Vulnerabilities">6.11.3 Remote File Inclusion Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.12. Exploiting Insecure Code Practices">6.12. Exploiting Insecure Code Practices</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.12.1 Overview">6.12.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.12.2 Comments in Source Code">6.12.2 Comments in Source Code</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.12.3 Lack of Error Handling and Overly Verbose Error Handling">6.12.3 Lack of Error Handling and Overly Verbose Error Handling</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.12.4 Practice - Insecure Code">6.12.4 Practice - Insecure Code</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.12.5 Hard-Coded Credentials">6.12.5 Hard-Coded Credentials</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.12.6 Race Conditions">6.12.6 Race Conditions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.12.7 Unprotected APIs">6.12.7 Unprotected APIs</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.12.8 Practice - Unprotected APIs">6.12.8 Practice - Unprotected APIs</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.12.9 Hidden Elements">6.12.9 Hidden Elements</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.12.10 Lack of Code Signing">6.12.10 Lack of Code Signing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.12.11 Additional Web Application Hacking Tools">6.12.11 Additional Web Application Hacking Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.12.12 Practice - Web Hacking Tools">6.12.12 Practice - Web Hacking Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.12.13 Lab - Use the OWASP Web Security Testing Guide">6.12.13 Lab - Use the OWASP Web Security Testing Guide</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="6.13. Summary">6.13. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.13.1 What Did I Learn in this Module?">6.13.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="6.13.2 Reflection Questions">6.13.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="6.13.3 Quiz - Performing Post-Exploitation Techniques">6.13.3 Quiz - Performing Post-Exploitation Techniques</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/3aafb093-6ae4-43ed-a63a-5fda0ff72d50.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 7: Cloud, Mobile, and IoT Security</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active"></div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height:2100px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="7.0. Introduction">7.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.0.1 Why Should I Take This Module?">7.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="7.0.2 What Will I Learn in This Module?">7.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="7.1. Researching Attack Vectors and Performing Attacks on Cloud Technologies">7.1. Researching Attack Vectors and Performing Attacks on Cloud Technologies</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.1.1 Overview">7.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.1.2 Practice - Types of Cloud Services">7.1.2 Practice - Types of Cloud Services</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.1.3 Credential Harvesting">7.1.3 Credential Harvesting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.1.4 Practice - Credential Harvesting">7.1.4 Practice - Credential Harvesting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.1.5 Privilege Escalation">7.1.5 Privilege Escalation</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.1.6 Account Takeover">7.1.6 Account Takeover</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.1.7 Metadata Service Attacks">7.1.7 Metadata Service Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.1.8 Attacks Against Misconfigured Cloud Assets">7.1.8 Attacks Against Misconfigured Cloud Assets</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.1.9 Resource Exhaustion and DoS Attacks">7.1.9 Resource Exhaustion and DoS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.1.10 Cloud Malware Injection Attacks">7.1.10 Cloud Malware Injection Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.1.11 Side-Channel Attacks">7.1.11 Side-Channel Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.1.12 Practice - Cloud Attack Types">7.1.12 Practice - Cloud Attack Types</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="7.1.13 Tools and Software Development Kits (SDKs)">7.1.13 Tools and Software Development Kits (SDKs)</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="7.2. Explaining Common Attacks and Vulnerabilities Against Specialized Systems">7.2. Explaining Common Attacks and Vulnerabilities Against Specialized Systems</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.1 Overview">7.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.2 Attacking Mobile Devices">7.2.2 Attacking Mobile Devices</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.3 Practice - Mobile Device Vulnerabilities">7.2.3 Practice - Mobile Device Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.4 Practice - Attacking Mobile Devices">7.2.4 Practice - Attacking Mobile Devices</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.5 Attacking Internet of Things (IoT) Devices">7.2.5 Attacking Internet of Things (IoT) Devices</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.6 Analyzing IoT Protocols">7.2.6 Analyzing IoT Protocols</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.7 Practice - Analyzing IoT Protocols">7.2.7 Practice - Analyzing IoT Protocols</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.8 IoT Security Special Considerations">7.2.8 IoT Security Special Considerations</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.9 Common IoT Vulnerabilities">7.2.9 Common IoT Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.10 Practice - Common IoT Vulnerabilities">7.2.10 Practice - Common IoT Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.11 Data Storage System Vulnerabilities">7.2.11 Data Storage System Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.12 Management Interface Vulnerabilities">7.2.12 Management Interface Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.13 Practice - Management Interface Vulnerabilities">7.2.13 Practice - Management Interface Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.14 Exploiting Virtual Machines">7.2.14 Exploiting Virtual Machines</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.15 Vulnerabilities Related to Containerized Workloads">7.2.15 Vulnerabilities Related to Containerized Workloads</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="7.2.16 Practice - Vulnerabilities Related to Containerized Workloads">7.2.16 Practice - Vulnerabilities Related to Containerized Workloads</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="7.3. Summary">7.3. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.3.1 What Did I Learn in this Module?">7.3.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="7.3.2 Reflection Questions">7.3.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="7.3.3 Quiz - Cloud, Mobile, and IoT Security">7.3.3 Quiz - Cloud, Mobile, and IoT Security</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/033c4cdd-4f5b-4782-8bcc-4716e0e96a17.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 8: Performing Post-Exploitation Techniques</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active"></div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height:1450px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="8.0. Introduction">8.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.0.1 Why Should I Take This Module?">8.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="8.0.2 What Will I Learn in This Module?">8.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="8.1. Creating a Foothold and Maintaining Persistence After Compromising a System">8.1. Creating a Foothold and Maintaining Persistence After Compromising a System</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.1.1 Overview">8.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.1.2 Reverse and Bind Shells">8.1.2 Reverse and Bind Shells</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.1.3 Practice - Reverse and Bind Shells">8.1.3 Practice - Reverse and Bind Shells</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.1.4 Command and Control (C2) Utilities">8.1.4 Command and Control (C2) Utilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.1.5 Practice - Types of C2 Utilities">8.1.5 Practice - Types of C2 Utilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.1.6 Scheduled Jobs and Tasks">8.1.6 Scheduled Jobs and Tasks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.1.7 Custom Daemons, Processes, and Additional Backdoors">8.1.7 Custom Daemons, Processes, and Additional Backdoors</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="8.1.8 New Users">8.1.8 New Users</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="8.2. Understanding How to Perform Lateral Movement, Detection Avoidance, and Enumeration">8.2. Understanding How to Perform Lateral Movement, Detection Avoidance, and Enumeration</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.2.1 Overview">8.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.2.2 Post-Exploitation Scanning">8.2.2 Post-Exploitation Scanning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.2.3 Legitimate Utilities and Living-off-the-Land">8.2.3 Legitimate Utilities and Living-off-the-Land</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.2.4 Practice - Post Exploitation">8.2.4 Practice - Post Exploitation</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.2.5 Post-Exploitation Privilege Escalation">8.2.5 Post-Exploitation Privilege Escalation</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.2.6 Practice - Post Exploitation Privilege Escalation">8.2.6 Practice - Post Exploitation Privilege Escalation</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.2.7 How to Cover Your Tracks">8.2.7 How to Cover Your Tracks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="8.2.8 Practice - Steganography">8.2.8 Practice - Steganography</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="8.3. Summary">8.3. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.3.1 What Did I Learn in this Module?">8.3.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="8.3.2 Reflection Questions">8.3.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="8.3.3 Quiz - Performing Post-Exploitation Techniques">8.3.3 Quiz - Performing Post-Exploitation Techniques</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/79cdd9d1-cefb-44de-bdfe-59cc4309440b.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 9: Reporting and Communication</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active"></div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height:2100px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="9.0. Introduction">9.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.0.1 Why Should I Take This Module?">9.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="9.0.2 What Will I Learn in This Module?">9.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="9.1. Comparing and Contrasting Important Components of Written Reports">9.1. Comparing and Contrasting Important Components of Written Reports</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.1.1 Overview">9.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.1.2 Report Contents">9.1.2 Report Contents</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.1.3 Practice - Penetration Reporting">9.1.3 Practice - Penetration Reporting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.1.4 Storage Time for Report and Secure Distribution">9.1.4 Storage Time for Report and Secure Distribution</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.1.5 Practice - Control and Distribution of Reports">9.1.5 Practice - Control and Distribution of Reports</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.1.6 Note Taking">9.1.6 Note Taking</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.1.7 Common Themes/Root Causes">9.1.7 Common Themes/Root Causes</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.1.8 Practice - Common Themes/Root Causes">9.1.8 Practice - Common Themes/Root Causes</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="9.1.9 Lab - Explore PenTest Reports">9.1.9 Lab - Explore PenTest Reports</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="9.2. Analyzing the Findings and Recommending the Appropriate Remediation Within a Report">9.2. Analyzing the Findings and Recommending the Appropriate Remediation Within a Report</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.2.1 Overview">9.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.2.2 Technical Controls">9.2.2 Technical Controls</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.2.3 Administrative Controls">9.2.3 Administrative Controls</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.2.4 Operational Controls">9.2.4 Operational Controls</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.2.5 Physical Controls">9.2.5 Physical Controls</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.2.6 Practice - Recommended Controls">9.2.6 Practice - Recommended Controls</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="9.2.7 Lab - Recommend Remediation Based on Findings">9.2.7 Lab - Recommend Remediation Based on Findings</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="9.3. Explaining the Importance of Communication During the Penetration Testing Process">9.3. Explaining the Importance of Communication During the Penetration Testing Process</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.3.1 Overview">9.3.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.3.2 Communication Triggers">9.3.2 Communication Triggers</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.3.3 Practice - Communication Triggers">9.3.3 Practice - Communication Triggers</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.3.4 Reasons for Communication">9.3.4 Reasons for Communication</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="9.3.5 Goal Reprioritization and Presentation of Findings">9.3.5 Goal Reprioritization and Presentation of Findings</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="9.4. Explaining Post-Report Delivery Activities">9.4. Explaining Post-Report Delivery Activities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.4.1 Overview">9.4.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.4.2 Post-Engagement Cleanup">9.4.2 Post-Engagement Cleanup</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.4.3 Additional Post-Report Delivery Activities">9.4.3 Additional Post-Report Delivery Activities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="9.4.4 Practice - Post Report Delivery">9.4.4 Practice - Post Report Delivery</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="9.5. Summary">9.5. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.5.1 What Did I Learn in this Module?">9.5.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="9.5.2 Reflection Questions">9.5.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="9.5.3 Quiz - Reporting and Communication">9.5.3 Quiz - Reporting and Communication</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/3352c9d8-875c-42fd-8058-09f932d0074b.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 10: Tools and Code Analysis</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active"></div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height:2950px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="10.0. Introduction">10.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.0.1 Why Should I Take This Module?">10.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="10.0.2 What Will I Learn in This Module?">10.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="10.1. Understanding the Basic Concepts of Scripting and Software Development">10.1. Understanding the Basic Concepts of Scripting and Software Development</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.1 Overview">10.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.2 Logic Constructs">10.1.2 Logic Constructs</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.3 Practice - Logic Constructs">10.1.3 Practice - Logic Constructs</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.4 Data Structures">10.1.4 Data Structures</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.5 Practice - Data Structures">10.1.5 Practice - Data Structures</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.6 Libraries">10.1.6 Libraries</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.7 Procedures">10.1.7 Procedures</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.8 Functions">10.1.8 Functions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.9 Classes">10.1.9 Classes</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.10 Analysis of Scripts and Code Samples for Use in Penetration Testing">10.1.10 Analysis of Scripts and Code Samples for Use in Penetration Testing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.11 Practice - Scripting">10.1.11 Practice - Scripting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.12 The Bash Shell">10.1.12 The Bash Shell</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.13 Resources to Learn Python">10.1.13 Resources to Learn Python</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.14 Resources to Learn Ruby">10.1.14 Resources to Learn Ruby</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.15 Resources to Learn PowerShell">10.1.15 Resources to Learn PowerShell</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.16 Resources to Learn Perl">10.1.16 Resources to Learn Perl</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.17 Resources to Learn JavaScript">10.1.17 Resources to Learn JavaScript</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.18 Practice - Programming Languages">10.1.18 Practice - Programming Languages</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.19 Lab - Analyze Exploit Code">10.1.19 Lab - Analyze Exploit Code</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="10.1.20 Lab - Analyze Automation Code">10.1.20 Lab - Analyze Automation Code</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="10.2. Understanding the Different Use Cases of Penetration Testing Tools and Analyzing Exploit Code">10.2. Understanding the Different Use Cases of Penetration Testing Tools and Analyzing Exploit Code</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.1 Overview">10.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.2 Penetration Testing - Focused Linux Distributions">10.2.2 Penetration Testing - Focused Linux Distributions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.3 Common Tools for Reconnaissance and Enumeration">10.2.3 Common Tools for Reconnaissance and Enumeration</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.4 Practice - Common Tools for Reconnaissance and Enumeration">10.2.4 Practice - Common Tools for Reconnaissance and Enumeration</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.5 Common Tools for Vulnerability Scanning">10.2.5 Common Tools for Vulnerability Scanning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.6 Practice - Common Tools for Vulnerability Scanning">10.2.6 Practice - Common Tools for Vulnerability Scanning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.7 Common Tools for Credential Attacks">10.2.7 Common Tools for Credential Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.8 Practice - Common Tools for Credential Attacks">10.2.8 Practice - Common Tools for Credential Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.9 Common Tools for Persistence">10.2.9 Common Tools for Persistence</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.10 Practice - Common Tools for Persistence">10.2.10 Practice - Common Tools for Persistence</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.11 Common Tools for Evasion">10.2.11 Common Tools for Evasion</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.12 Practice - Common Tools for Evasion">10.2.12 Practice - Common Tools for Evasion</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.13 Exploitation Frameworks">10.2.13 Exploitation Frameworks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.14 Practice - Exploitation Frameworks">10.2.14 Practice - Exploitation Frameworks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.15 Common Decompilation, Disassembly, and Debugging Tools">10.2.15 Common Decompilation, Disassembly, and Debugging Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.16 Practice - Common Decompilation, Disassembly, and Debugging Tools">10.2.16 Practice - Common Decompilation, Disassembly, and Debugging Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.17 Common Tools for Forensics">10.2.17 Common Tools for Forensics</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.18 Practice - Common Tools for Forensics">10.2.18 Practice - Common Tools for Forensics</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.19 Common Tools for Software Assurance">10.2.19 Common Tools for Software Assurance</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.20 Practice - Common Tools for Software Assurance">10.2.20 Practice - Common Tools for Software Assurance</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.21 Wireless Tools">10.2.21 Wireless Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.22 Practice - Wireless Tools">10.2.22 Practice - Wireless Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.23 Steganography Tools">10.2.23 Steganography Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.24 Practice - Steganography Tools">10.2.24 Practice - Steganography Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.25 Cloud Tools">10.2.25 Cloud Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="10.2.26 Practice - Cloud Tools">10.2.26 Practice - Cloud Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="10.3. Summary">10.3. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.3.1 What Did I Learn in this Module?">10.3.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="10.3.2 Reflection Questions">10.3.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="10.3.3 Quiz -  Tools and Code Analysis">10.3.3 Quiz - Tools and Code Analysis</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ"></div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Final Capstone Activity</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active"></div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height:50em;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="Final Capstone Activity">Final Capstone Activity</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do"></span><span class="blockName--uu11F" title="Objectives">Objectives</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do"></span><span class="blockName--uu11F" title="Required Resources">Required Resources</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/3d237b16-c5c6-4650-918d-6b7b6dfe6ddd.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Ethical Hacker: Course Final Exam</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active"></div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height:50em;"><div class="subModuleContainer--D82xI viewOnlyMode--D1Vix mediumFont--krlDJ showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="Course Final Exam">Course Final Exam</div></div></div><div class="subModuleContainer--D82xI viewOnlyMode--D1Vix mediumFont--krlDJ showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt"></div><div class="subModuleName--NhmoF" title="End of Course Survey">End of Course Survey</div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>## Resources

<div class="tabContentWrapper--ozRIX" id="bkmrk-no-resources-found."><div class="b2c_containerPadding--mLGeD"><div class="row"><div class="col-md-12 col-lg-7 order-lg-1"><div class="dbl-margin-top dbl-margin-bottom" id="bkmrk-no-resources-found.-1"><div><div class="dbl-margin-top text-size-12"><div><div id="bkmrk-no-resources-found.-2"><div><div class="dbl-margin-top dbl-margin-bottom" id="bkmrk-no-resources-found.-3"><div class="container-fluid"><div class="dbl-margin-bottom"><div class="clearfix base-margin-bottom"><div class="pull-left">  
</div></div><div class="noDataWrapper--YyHW+ text-center"><div class="text-size-18 text-weight-700 base-margin-top">No Resources Found.</div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>

# Welcome to the Ethical Hacker Course

<div class="article__header" id="bkmrk-i-started-ripping-th"><div class="article__header-inner"><div class="article__title">  
i started ripping this course on August 30th of 2023 </div><div class="article__title">so some things may be a bit different if you take the course</div><div class="article__title">[https://skillsforall.com/course/ethical-hacker?courseLang=en-US](https://skillsforall.com/course/ethical-hacker?courseLang=en-US)  
---

<div class="article__title-inner">  
The Fictional Companies in the Ethical Hacker Course</div></div></div></div>Throughout the content of the course, you follow an engaging gamified narrative and get lots of practice with hands-on labs inspired by real-world scenarios. On this journey, you will be guided by your virtual mentor “Alex” at our fictional offensive security company, **Protego Security Solutions**. Within your role as a junior penetration tester at Protego, you will learn all the penetration testing phases of a client engagement. **Pixel Paradise**, a video game company, is the fictional company that will serve as your client during the course.

Below are informational flyers for each fictional company.

<div class="block__container" id="bkmrk-complete-your-employ"><div class="block 64c2ce4cfcc1c4698ff75ba5 is-complete"><div class="block__inner"><div class="component__container"><div class="component text 64c2ce5d781bce6b10adcbd4 background-color-gray remove-padding-bottom is-full is-complete"><div class="component__inner text__inner"><div class="component__header text__header" id="bkmrk-"><div class="component__header-inner text__header-inner"><div class="component__body text__body"><div class="component__body-inner text__body-inner">  
</div></div></div></div></div></div></div></div></div><div class="block 64c287e92b726d68e602fddd background-color-white remove-padding-top remove-padding-bottom is-complete"><div class="block__inner"><div class="component__container"><div class="component webcomponentmedia 64c2cbe9fcc1c4698ff75ba3 is-undefined is-complete zoom-img-enabled"><div><div class="component__header webcomponentmedia__header"><div class="component__header-inner webcomponentmedia__header-inner"><div class="component__title webcomponentmedia__title"><div class="js-heading is-complete"><div class="js-heading-inner" id="bkmrk-complete-your-employ-1"><span class="aria-label"> Complete Your Employer: Protego Security Solutions </span></div></div><div class="component__title-inner webcomponentmedia__title-inner">Your Employer: Protego Security Solutions</div><div class="component__title-inner webcomponentmedia__title-inner">(id copy and paste with formating but this is just so hard with all the details so ill just do a picture  
</div></div></div></div></div></div></div></div></div></div>[![image.png](https://library.naruzkurai.com/uploads/images/gallery/2023-08/scaled-1680-/image.png)](https://library.naruzkurai.com/uploads/images/gallery/2023-08/image.png)

<div class="article__header" id="bkmrk-what-will-i-learn-in"><div class="article__header-inner"><div class="article__title"><div class="article__title-inner">What Will I Learn in This Course?</div></div></div></div>The digital landscape is evolving at an unprecedented rate and cyber threats lurk around every corner. Cybersecurity resilience in the modern world cannot be just an add on - it's a necessity.

Offensive security professionals like ethical hackers and penetration testers can help proactively discover unknown threats and address them before the cybercriminals do.

This course is designed to prepare you with an Ethical Hacker skillset and give you a solid understanding of offensive security. You will become proficient in the art of scoping, executing, and reporting on vulnerability assessments, while recommending mitigation strategies.

After completing this course, continue your cybersecurity career in offensive security (red team) as an ethical hacker or penetration tester. Or use this course to strengthen your defensive security (blue team) knowledge. By understanding the mindset of threat actors, you will be able to more effectively implement security controls and monitor, analyze, and respond to current security threats.

<table id="bkmrk-module-title-module-" style="width:100%;"><tbody><tr class="table-row nth-child-0"><th class="table-data table-heading nth-child-0" colspan="1" rowspan="1" style="width:41.6521%;">**Module Title**

</th><th class="table-data table-heading nth-child-1" colspan="1" rowspan="1" style="width:58.3376%;">**Module Objective**

</th></tr><tr class="table-row nth-child-1"><td class="table-data nth-child-0" colspan="1" rowspan="1" style="width:41.6521%;">Introduction to Ethical Hacking and Penetration Testing

</td><td class="table-data nth-child-1" colspan="1" rowspan="1" style="width:58.3376%;">Explain the importance of methodological ethical hacking and penetration testing.

</td></tr><tr class="table-row nth-child-2"><td class="table-data nth-child-0" colspan="1" rowspan="1" style="width:41.6521%;">Planning and Scoping a Penetration Testing Assessment

</td><td class="table-data nth-child-1" colspan="1" rowspan="1" style="width:58.3376%;">Create penetration testing preliminary documents.

</td></tr><tr class="table-row nth-child-3"><td class="table-data nth-child-0" colspan="1" rowspan="1" style="width:41.6521%;">Information Gathering and Vulnerability Scanning

</td><td class="table-data nth-child-1" colspan="1" rowspan="1" style="width:58.3376%;">Perform information gathering and vulnerability scanning activities.

</td></tr><tr class="table-row nth-child-4"><td class="table-data nth-child-0" colspan="1" rowspan="1" style="width:41.6521%;">Social Engineering Attacks

</td><td class="table-data nth-child-1" colspan="1" rowspan="1" style="width:58.3376%;">Explain how social engineering attacks succeed.

</td></tr><tr class="table-row nth-child-5"><td class="table-data nth-child-0" colspan="1" rowspan="1" style="width:41.6521%;">Exploiting Wired and Wireless Networks

</td><td class="table-data nth-child-1" colspan="1" rowspan="1" style="width:58.3376%;">Explain how to exploit wired and wireless network vulnerabilities.

</td></tr><tr class="table-row nth-child-6"><td class="table-data nth-child-0" colspan="1" rowspan="1" style="width:41.6521%;">Exploiting Application-Based Vulnerabilities

</td><td class="table-data nth-child-1" colspan="1" rowspan="1" style="width:58.3376%;">Explain how to exploit application-based vulnerabilities.

</td></tr><tr class="table-row nth-child-7"><td class="table-data nth-child-0" colspan="1" rowspan="1" style="width:41.6521%;">Cloud, Mobile, and IoT Security

</td><td class="table-data nth-child-1" colspan="1" rowspan="1" style="width:58.3376%;">Explain how to exploit cloud, mobile, and IoT security vulnerabilities.

</td></tr><tr class="table-row nth-child-8"><td class="table-data nth-child-0" colspan="1" rowspan="1" style="width:41.6521%;">Performing Post-Exploitation Techniques

</td><td class="table-data nth-child-1" colspan="1" rowspan="1" style="width:58.3376%;">Explain how to perform post-exploitation activities.

</td></tr><tr class="table-row nth-child-9"><td class="table-data nth-child-0" colspan="1" rowspan="1" style="width:41.6521%;">Reporting and Communication

</td><td class="table-data nth-child-1" colspan="1" rowspan="1" style="width:58.3376%;">Create a penetration testing report.

</td></tr><tr class="table-row nth-child-10"><td class="table-data nth-child-0" colspan="1" rowspan="1" style="width:41.6521%;">Tools and Code Analysis

</td><td class="table-data nth-child-1" colspan="1" rowspan="1" style="width:58.3376%;">Classify pentesting tools by use case.

</td></tr></tbody></table>

<div class="article__header" id="bkmrk-ethical-hacking-stat"><div class="article__header-inner"><div class="article__title"><div class="article__title-inner">Ethical Hacking Statement</div></div></div></div><div class="block__container" id="bkmrk-this-is-a-multiple-c"><div class="block 64c26ae2e394fc68507fd4e0"><div class="block__inner"><div class="component__container"><div class="component is-question mcq 64c2d48714d1016b75c35481 is-full can-show-model-answer can-show-feedback can-show-marking"><div class="component__inner mcq__inner"><div class="component__header mcq__header"><div class="component__header-inner mcq__header-inner"><div class="aria-label">This is a multiple choice question. Once you have selected an option, select the submit button below</div><div class="component__body mcq__body"><div class="component__body-inner mcq__body-inner"><div class="row"><div class="col-md-12"><div class="text-asset undefined">  
</div></div></div></div></div></div></div></div></div></div></div></div></div>In this course, you will explore and apply various tools and techniques within a controlled, "sandboxed" Ethical Hacker Kali Linux virtual machine environment to simulate cyber-attacks and discover, assess, and exploit built-in vulnerabilities. It is crucial to acknowledge that the hands-on labs are meant solely for educational purposes, aiming to equip you with the skills to identify and safeguard against real-world threats. The vulnerabilities and weaknesses demonstrated here must be used responsibly and ethically, exclusively within this designated "sandboxed" environment.

Engaging with these tools, techniques, or resources beyond the provided "sandboxed" virtual environment or outside your authorized scope may lead to violations of local laws and regulations. We strongly emphasize the **importance** of seeking clarification from your administrator or instructor before attempting any experimentation.

It is imperative to comprehend that **unauthorized access to data, computer systems, and networks is illegal** in numerous jurisdictions, **regardless of intentions or motivations**. We emphasize the significance of using your newfound knowledge responsibly and ensuring compliance with all applicable laws and regulations.

**By accepting this "Ethical Hacker Statement," you acknowledge the critical importance of utilizing the skills acquired in this course for ethical and lawful purposes only, and you commit to upholding the principles of responsible cybersecurity practices. Remember, with great power comes great responsibility.**

**Your Acknowledgment**

Do you acknowledge and accept your responsibility, as the user of this course, to be cognizant of and compliant with local laws, regulations, and ethical use?

<div class="block__container" id="bkmrk-yes%2C-i-accept-my-res"><div class="block 64c26ae2e394fc68507fd4e0"><div class="block__inner"><div class="component__container"><div class="component is-question mcq 64c2d48714d1016b75c35481 is-full can-show-model-answer can-show-feedback can-show-marking"><div class="component__inner mcq__inner"><div class="component__header mcq__header" id="bkmrk--2"><div class="component__header-inner mcq__header-inner"><div class="component__body mcq__body"><div class="component__body-inner mcq__body-inner"><div class="row"><div class="col-md-12"><div class="text-asset undefined" id="bkmrk--3"></div></div></div></div></div></div></div><div class="component__widget mcq__widget"><div class="mcq__item js-mcq-item item-0"><div class="mcq__item-state"><div class="mcq__item-icon mcq__item-answer-icon is-radio"><div class="icon">  
</div></div></div><div class="mcq__item-text"><div class="mcq__item-text-inner">Yes, I accept my responsibility as specified in the **Ethical Hacking Statement**.</div></div></div><div class="mcq__item js-mcq-item item-1"><div class="mcq__item-state"><div class="mcq__item-icon mcq__item-answer-icon is-radio"><div class="icon">  
</div></div></div><div class="mcq__item-text"><div class="mcq__item-text-inner">No, I do not accept my responsibility as specified in the **Ethical Hacking Statement**.</div></div></div></div></div></div></div></div></div></div>

# 1.0.1-1.0.2 Why Should I Take This Module and what will i learn?

<div class="article__title-inner" id="bkmrk-">  
</div>## 1.0.1 Why Should I Take This Module?

<div class="article__title-inner" id="bkmrk--1"></div><div class="article 643fe0159eaee20f20bcf1da background-color-gray is-complete" id="bkmrk--2"><div class="article__inner"><div class="block__container"><div class="block 6442d1f0e96d0e1d078133e4 background-color-gray remove-padding-top is-complete"><div class="block__inner"><div class="component__container"><div class="component graphic 6442d2bd87ab4e1c175b654e mentor_image forty-padding-top is-left is-complete zoom-img-enabled"><div class="component__inner graphic__inner"><div class="component__widget graphic__widget"><div class="graphic__image-container">![06ec07a67d19c2f7f55d228a9f4e463524053d82.png](https://skillsforall.com/content/eh/1.0/m1/course/en-US/assets/06ec07a67d19c2f7f55d228a9f4e463524053d82.png)</div></div></div></div><div class="component text 6442d1f0e96d0e1d078133e5 half_padding is-right is-complete zoom-img-enabled"><div class="component__inner text__inner"><div class="component__header text__header"><div class="component__header-inner text__header-inner"><div class="component__body text__body"><div class="component__body-inner text__body-inner">  
</div></div></div></div></div></div></div></div></div></div></div></div>**Protego Security Solutions Task**

Welcome to Protego! My name is Alex. I will be your mentor for your first 90 days here. Our recruiter was very impressed with your enthusiasm and desire to enter the cybersecurity profession.

We’ll be working together to get you ready for your role as an entry-level penetration tester. We’ll be talking about ways that you can prepare for participating in our customer engagements and I have a number of activities for you to complete that will quickly enhance your skills.

We will talk about some important big ideas in penetration testing and then get your practice lab environment up and running.

I know you will enjoy working at Protego, and I look forward to working with you as you grow in your career with us.

Before we jump into how to perform penetration testing, you first need to understand some core concepts about the “art of hacking” that will help you understand the other concepts discussed throughout this course. For example, you need to understand the difference between *ethical hacking* and *unethical hacking*. The tools and techniques used in this field change rapidly, so understanding the most current threats and attacker motivations is also important. Some consider penetration testing an art; however, this art needs to start out with a methodology if it is to be effective. Furthermore, you need to spend some time understanding the different types of testing and the industry methods used. Finally, this is a hands-on concept, and you need to know how to get your hands dirty by properly building a lab environment for testing.

<div class="article b5c8963e283b4fa08854df45e0345b06 is-complete" id="bkmrk--3"><div class="article__inner"><div class="block__container"><div class="block 6446975aa70da71fb1703d4b is-complete"><div class="block__inner"></div></div></div></div></div><div class="article b5c8963e283b4fa08854df45e0345b06 is-complete" id="bkmrk--5"><div class="article__inner"><div class="block__container"><div class="block 6446975aa70da71fb1703d4b is-complete"><div class="block__inner"><div class="component__container">---

<div class="component blank 6446975da70da71fb1703d4c is-full is-complete zoom-img-enabled">  
</div></div></div></div></div></div></div>## 1.0.2 What Will I Learn in This Module?

<div class="article__title-inner" id="bkmrk--6"></div><div class="article 643fe0169eaee20f20bcf1db background-color-white is-complete" id="bkmrk--7"><div class="article__inner"><div class="block__container"><div class="block 643fe0179eaee20f20bcf1fd background-color-white remove-padding-bottom is-complete"><div class="block__inner"><div class="component__container"><div class="component text 643fe01a9eaee20f20bcf23d is-full is-complete"><div class="component__inner text__inner"><div class="component__header text__header"><div class="component__header-inner text__header-inner"><div class="component__body text__body"><div class="component__body-inner text__body-inner">  
</div></div></div></div></div></div></div></div></div></div></div></div>**Module Title**: Introduction to Ethical Hacking and Penetration Testing

**Module Objective**: Explain the importance of methodological ethical hacking and penetration testing.

<div class="article 643fe0169eaee20f20bcf1db background-color-white is-complete" id="bkmrk-topic-title-topic-ob"><div class="article__inner"><div class="block__container"><div class="block 643fe0179eaee20f20bcf1fd background-color-white remove-padding-bottom is-complete"><div class="block__inner"><div class="component__container"><div class="component text 643fe01a9eaee20f20bcf23d is-full is-complete"><div class="component__inner text__inner"><div class="component__header text__header" id="bkmrk--8"><div class="component__header-inner text__header-inner"><div class="component__body text__body"><div class="component__body-inner text__body-inner">  
</div></div></div></div></div></div></div></div></div><div class="block 643fe0179eaee20f20bcf1fe background-color-white remove-padding-top is-complete"><div class="block__inner"><div class="component__container"><div class="component table 643fe01a9eaee20f20bcf23e is-full is-complete"><div class="table-inner component-inner"><div class="table-wrapper"><div class="table-widget component-widget"><table style="min-width:800px;"><tbody><tr class="table-row nth-child-0"><th class="table-data table-heading nth-child-0" colspan="1" rowspan="1">**Topic Title**</th><th class="table-data table-heading nth-child-1" colspan="1" rowspan="1">**Topic Objective**</th></tr><tr class="table-row nth-child-1"><td class="table-data nth-child-0" colspan="1" rowspan="1">Understanding Ethical Hacking and Penetration Testing</td><td class="table-data nth-child-1" colspan="1" rowspan="1">Explain the importance of ethical hacking and penetration testing.</td></tr><tr class="table-row nth-child-2"><td class="table-data nth-child-0" colspan="1" rowspan="1">Exploring Penetration Testing Methodologies</td><td class="table-data nth-child-1" colspan="1" rowspan="1">Explain different types of penetration testing methodologies and frameworks.</td></tr><tr class="table-row nth-child-3"><td class="table-data nth-child-0" colspan="1" rowspan="1">Building Your Own Lab</td><td class="table-data nth-child-1" colspan="1" rowspan="1">Configure a virtual machine for your penetration testing learning experience.</td></tr></tbody></table>

</div></div></div></div></div></div></div></div></div></div>

# 1.1.1 Overview

<div class="article 643fe0169eaee20f20bcf1df background-color-gray is-complete" id="bkmrk-1.1.1-overview"><div class="article__inner"><div class="article__header"><div class="article__header-inner"><div class="article__title"><div class="article__title-inner">1.1.1 Overview</div></div></div></div><div class="block__container"><div class="block 6442e05887ab4e1c175b656a background-color-gray remove-padding-bottom is-complete"><div class="block__inner"><div class="component__container"><div class="component graphic 6442e0be87ab4e1c175b656c mentor_image is-left is-complete zoom-img-enabled"><div class="component__inner graphic__inner"><div class="component__header graphic__header" id="bkmrk-"><div class="component__header-inner graphic__header-inner"><div class="component__body graphic__body"><div class="component__body-inner graphic__body-inner">  
</div></div></div></div><div class="component__widget graphic__widget"><div class="graphic__image-container">![ed37c17a05c243d5dea2a490d0f36061f6ca672f.png](https://skillsforall.com/content/eh/1.0/m1/course/en-US/assets/ed37c17a05c243d5dea2a490d0f36061f6ca672f.png)</div></div></div></div><div class="component text 6442e05987ab4e1c175b656b half_padding is-right is-complete zoom-img-enabled"><div class="component__inner text__inner"><div class="component__header text__header"><div class="component__header-inner text__header-inner"><div class="component__body text__body"><div class="component__body-inner text__body-inner">  
</div></div></div></div></div></div></div></div></div></div></div></div>**Protego Security Solutions**

Alex here! We will be meeting periodically over the next few weeks so you can get oriented to working at Protego and also build your skills and knowledge as we increase your involvement in our customer engagements.

At the very heart of what we do is our purpose. You need to understand why we do what we do and who our enemies are. Once you have a strong foundation here, we can move on to understanding how we accomplish our purpose.

As a refresher, the term ***ethical hacker*** describes a person who acts as an attacker and evaluates the security posture of a computer network for the purpose of minimizing risk. The NIST Computer Security Resource Center (CSRC) defines a *hacker* as an “unauthorized user who attempts to or gains access to an information system.” Now, we all know that the term *hacker* has been used in many different ways and has many different definitions. Most people in a computer technology field would consider themselves hackers based on the simple fact that they like to tinker. This is obviously not a malicious thing. So, the key factor here in defining ethical versus nonethical hacking is that the latter involves malicious intent. The *permission to attack* or permission to test is crucial and what will keep you out of trouble! This permission to attack is often referred to as “the scope” of the test (what you are allowed and not allowed to test). More on this later in this module.

A security researcher looking for vulnerabilities in products, applications, or web services is considered an ethical hacker if he or she responsibly discloses those vulnerabilities to the vendors or owners of the targeted research. However, the same type of “research” performed by someone who then uses the same ***vulnerability*** to gain unauthorized access to a target network/system would be considered a nonethical hacker. We could even go so far as to say that someone who finds a vulnerability and discloses it publicly without working with a vendor is considered a nonethical hacker – because this could lead to the compromise of networks/systems by others who use this information in a malicious way.

The truth is that as an ethical hacker, you use the same tools to find vulnerabilities and exploit targets as do nonethical hackers. However, as an ethical hacker, you would typically report your findings to the vendor or customer you are helping to make the network more secure. You would also try to avoid performing any tests or exploits that might be destructive in nature.

An ethical hacker’s goal is to analyze the security posture of a network’s or system’s infrastructure in an effort to identify and possibly exploit any security weaknesses found and then determine if a compromise is possible. This process is called *security* ***penetration testing*** or *ethical* *hacking*.

<div class="article 643fe0169eaee20f20bcf1df background-color-gray is-complete" id="bkmrk--1"><div class="article__inner"><div class="block__container"><div class="block 6442e24287ab4e1c175b6582 background-color-gray remove-padding-top remove-padding-bottom is-complete"><div class="block__inner"><div class="component__container"><div class="component text 6442e24287ab4e1c175b6583 border-top is-full is-complete zoom-img-enabled"><div class="component__inner text__inner"><div class="component__header text__header" id="bkmrk--2"><div class="component__header-inner text__header-inner"><div class="component__body text__body"><div class="component__body-inner text__body-inner">  
</div></div></div></div></div></div></div></div></div><div class="block 643fe0179eaee20f20bcf204 background-color-gray remove-padding-top is-complete"><div class="block__inner"><div class="component__container"><div class="component graphic 6442e29e87ab4e1c175b6584 mentor_image is-left is-complete zoom-img-enabled"><div class="component__inner graphic__inner"><div class="component__widget graphic__widget"><div class="graphic__image-container">![9fe335c3402be35a103a8ca743c9d40c2963f5da.png](https://skillsforall.com/content/eh/1.0/m1/course/en-US/assets/9fe335c3402be35a103a8ca743c9d40c2963f5da.png)</div></div></div></div><div class="component text 643fe01a9eaee20f20bcf244 eighty-padding-top eh-tip is-right is-complete zoom-img-enabled"><div class="component__inner text__inner"><div class="component__header text__header"><div class="component__header-inner text__header-inner"><div class="component__body text__body"><div class="component__body-inner text__body-inner"><div>  
</div></div></div></div></div></div></div></div></div></div></div></div></div>**TIP** Hacking is NOT a Crime ( [*hackingisnotacrime.org*](https://www.hackingisnotacrime.org/) ) is a nonprofit organization that attempts to raise awareness about the pejorative use of the term *hacker*. Historically, *hackers* have been portrayed as evil or illegal. Luckily, a lot of people already know that hackers are curious individuals who want to understand how things work and how to make them more secure.

<div class="article 0b2e374432344048ae0ba0fb9495b820 is-complete" id="bkmrk--3"><div class="article__inner"><div class="block__container"><div class="block 644699c7a70da71fb1703d5a is-complete"><div class="block__inner"><div class="component__container"><div class="component blank 644699cca70da71fb1703d5b is-full is-complete zoom-img-enabled"></div></div></div></div></div></div></div><div class="article 643fe0169eaee20f20bcf1e0 background-color-white is-complete" id="bkmrk-1.1.2-why-do-we-need"><div class="article__inner"><div class="article__header"><div class="article__header-inner"><div class="article__title"><div class="js-heading is-complete"><div class="js-heading-inner" id="bkmrk--4"></div></div><div class="article__title-inner">1.1.2 Why Do We Need to Do Penetration Testing?</div></div></div></div><div class="block__container"><div class="block 643fe0179eaee20f20bcf206 background-color-white is-complete"><div class="block__inner"><div class="component__container"><div class="component text 643fe01a9eaee20f20bcf246 is-full is-complete"><div class="component__inner text__inner"><div class="component__header text__header"><div class="component__header-inner text__header-inner"><div class="component__body text__body"><div class="component__body-inner text__body-inner">  
</div></div></div></div></div></div></div></div></div></div></div></div>So, why do we need penetration testing? Well, first of all, as someone who is responsible for securing and defending a network/system, you want to find any possible paths of compromise before the bad guys do. For years we have developed and implemented many different defensive techniques (for instance, antivirus, firewalls, intrusion prevention systems \[IPSs\], anti-malware). We have deployed defense-in-depth as a method to secure and defend our networks. But how do we know if those defenses really work and whether they are enough to keep out the bad guys? How valuable is the data that we are protecting, and are we protecting the right things? These are some of the questions that should be answered by a penetration test. If you build a fence around your yard with the intent of keeping your dog from getting out, maybe it only needs to be 4 feet tall. However, if your concern is not the dog getting out but an intruder getting in, then you need a different fence – one that would need to be much taller than 4 feet. Depending on what you are protecting, you might also want razor wire on the top of the fence to deter the bad guys even more. When it comes to information security, we need to do the same type of assessments on our networks and systems. We need to determine what it is we are protecting and whether our defenses can hold up to the threats that are imposed on them. This is where penetration testing comes in. Simply implementing a firewall, an IPS, anti-malware, a VPN, a web application firewall (WAF), and other modern security defenses isn’t enough. You also need to test their validity. And you need to do this on a regular basis. As you know, networks and systems change constantly. This means the attack surface can change as well, and when it does, you need to consider reevaluating the security posture by way of a penetration test.

<div class="article 9f6bbae6396e4edf97b8f153b6d59388 is-complete" id="bkmrk--5"><div class="article__inner"><div class="block__container"><div class="block 644699cea70da71fb1703d5c is-complete"><div class="block__inner"><div class="component__container"><div class="component blank 644699d3a70da71fb1703d5d is-full is-complete zoom-img-enabled"></div></div></div></div></div></div></div>

# 1.1.3 Lab - Researching PenTesting Careers

<div class="article 643fe0169eaee20f20bcf1e1 background-color-gray" id="bkmrk-"><div class="article__inner"><div class="block__container"><div class="block 643fe0179eaee20f20bcf208 background-color-gray remove-padding-bottom is-complete"><div class="block__inner"><div class="component__container"><div class="component graphic 6442e039361ea41d590633d7 mentor_image is-left zoom-img-enabled is-complete"><div class="component__inner graphic__inner"><div class="component__widget graphic__widget"><div class="graphic__image-container">![b28833c5bd627ec60d9f380b8ff7c51b48100ee9.png](https://skillsforall.com/content/eh/1.0/m1/course/en-US/assets/b28833c5bd627ec60d9f380b8ff7c51b48100ee9.png)</div></div></div></div><div class="component text 643fe01a9eaee20f20bcf248 half_padding is-right zoom-img-enabled is-complete"><div class="component__inner text__inner"><div class="component__header text__header"><div class="component__header-inner text__header-inner"><div class="component__body text__body"><div class="component__body-inner text__body-inner">  
</div></div></div></div></div></div></div></div></div></div></div></div>**Protego Security Solutions**

I think it is important for you to understand the employment landscape and the different roles and responsibilities that cybersecurity professions include. A good general reference to explore for descriptions of different job roles is The National Initiative for Cybersecurity Careers and Studies (NICCS) [Cyber Career Pathways Tool](https://niccs.cisa.gov/workforce-development/cyber-career-pathways-tool). It offers a visual way to discover and compare different job roles in our profession.

In this activity, you discover and compare ethical hacking jobs that are listed on various job boards. Don’t worry, we are not trying to get rid of you! We just want you to understand where you fit in to the big picture in our profession. I think that you will find that we are treating you very well, and rest assured that you have a lot of room to grow with us.

In this lab, you will complete the following objectives:

<div class="article 643fe0169eaee20f20bcf1e1 background-color-gray" id="bkmrk-conduct-a-penetratio"><div class="article__inner"><div class="block__container"><div class="block 6442e93387ab4e1c175b6592 background-color-gray remove-padding-top remove-padding-bottom"><div class="block__inner"><div class="component__container"><div class="component pagetracer 6442e98f87ab4e1c175b6599 remove-top-padding remove-padding-bottom hide-download-btn is-full zoom-img-enabled"><div class="component__inner pageTracer__inner"><div class="component__header pagetracer__header" id="bkmrk-conduct-a-penetratio-1"><div class="component__header-inner pagetracer__header-inner"><div class="component__body pagetracer__body"><div class="component__body-inner pagetracer__body-inner">- Conduct a Penetration Tester Job Search
- Analyze Penetration Tester Job Requirements
- Discover Resources to Further Your Career

</div></div></div></div><div class="component__widget pageTracer__widget"><div class="pageTracer-container"><div class="pageTracer-container__inner pageTracer-container__inner__1"><div class="pageTracer-btn-container"></div></div></div></div></div></div></div></div></div><div class="block 6442e96e87ab4e1c175b6598 background-color-gray remove-padding-top remove-padding-bottom is-complete"><div class="block__inner"><div class="component__container"><div class="component text 6442e9a987ab4e1c175b659a is-full zoom-img-enabled is-complete"><div class="component__inner text__inner"><div class="component__header text__header"><div class="component__header-inner text__header-inner"><div class="component__body text__body">  
</div></div></div></div></div></div></div></div></div></div></div><div class="article 643fe0169eaee20f20bcf1e1 background-color-gray" id="bkmrk-incomplete-skills-ch"><div class="article__inner"><div class="block__container"><div class="block 6442e96e87ab4e1c175b6598 background-color-gray remove-padding-top remove-padding-bottom is-complete"><div class="block__inner"><div class="component__container"><div class="component text 6442e9a987ab4e1c175b659a is-full zoom-img-enabled is-complete"><div class="component__inner text__inner"><div class="component__header text__header" id="bkmrk--1"><div class="component__header-inner text__header-inner"><div class="component__body text__body">  
</div></div></div></div></div></div></div></div><div class="block 6442e966361ea41d590633fd"><div class="block__inner"><div class="component__container"><div class="component is-question mcq 6442e9c5361ea41d590633fe is-full can-show-model-answer can-show-feedback can-show-marking zoom-img-enabled"><div class="component__inner mcq__inner"><div class="component__header mcq__header"><div class="component__header-inner mcq__header-inner"><div class="component__title mcq__title"><div class="js-heading is-incomplete"><div class="js-heading-inner" id="bkmrk-incomplete-skills-ch-1"> email <naruzkurai@gmail.com> to link the html hosting sheet</div></div><div class="component__title-inner mcq__title-inner">Skills Check</div></div><div class="aria-label">This is a multiple choice question. Once you have selected an option, select the submit button below</div><div class="component__body mcq__body"><div class="component__body-inner mcq__body-inner">  
</div></div></div></div></div></div></div></div></div></div></div></div>the following three internet job boards allow filtering job postings by seniority or experience level.

<div class="article 643fe0169eaee20f20bcf1e1 background-color-gray" id="bkmrk-glassdoor.com-indeed"><div class="article__inner"><div class="block__container"><div class="block 6442e966361ea41d590633fd"><div class="block__inner"><div class="component__container"><div class="component is-question mcq 6442e9c5361ea41d590633fe is-full can-show-model-answer can-show-feedback can-show-marking zoom-img-enabled"><div class="component__inner mcq__inner"><div class="component__header mcq__header" id="bkmrk--2"><div class="component__header-inner mcq__header-inner"><div class="component__body mcq__body">  
</div></div></div><div class="component__widget mcq__widget"><div class="mcq__item js-mcq-item item-0"><div class="mcq__item-text"><div class="mcq__item-text-inner">glassdoor.com</div></div></div><div class="mcq__item js-mcq-item item-1"><div class="mcq__item-text"><div class="mcq__item-text-inner">indeed.com</div></div></div><div class="mcq__item js-mcq-item item-2"><div class="mcq__item-text"><div class="mcq__item-text-inner">linkedin.com jobs</div><div class="mcq__item-text-inner">  
</div><div class="mcq__item-text-inner">At the time of this writing, monster.com did not have a filter for level of expertise or seniority in its job search results. but allows searching of weather or not you want to be at home part time etc.  
</div></div></div><div class="mcq__item-text-inner">  
</div></div></div></div></div></div></div></div></div></div>[![Screenshot_20230830-145457_Chrome.jpg](https://library.naruzkurai.com/uploads/images/gallery/2023-08/scaled-1680-/screenshot-20230830-145457-chrome.jpg)](https://library.naruzkurai.com/uploads/images/gallery/2023-08/screenshot-20230830-145457-chrome.jpg)

<div class="article 643fe0169eaee20f20bcf1e2 background-color-white" id="bkmrk-incomplete-1.1.4-thr"><div class="article__inner"><div class="article__header"><div class="article__header-inner"><div class="article__title"><div class="js-heading is-incomplete"><div class="js-heading-inner" id="bkmrk-incomplete-1.1.4-thr-1">---

</div></div></div></div></div></div></div>

# 1.1.4 Threat Actors

<div class="article 643fe0169eaee20f20bcf1e2 background-color-white" id="bkmrk-incomplete-1.1.4-thr"><div class="article__inner"><div class="article__header"><div class="article__header-inner"><div class="article__title"></div></div></div></div></div>Before you can understand how an ethical hacker or penetration tester can mimic a ***threat actor*** (or malicious attacker), you need to understand the different types of threat actors. The following are the most common types of malicious attackers we see today. Select each for more information.

<div class="article 643fe0169eaee20f20bcf1e2 background-color-white" id="bkmrk-organized-crime-seve"><div class="article__inner"><div class="block__container"><div class="block 643fe0189eaee20f20bcf20a background-color-white remove-padding-bottom is-complete"><div class="block__inner"><div class="component__container"><div class="component text 643fe01a9eaee20f20bcf24a is-full is-complete"><div class="component__inner text__inner"><div class="component__header text__header" id="bkmrk--7"><div class="component__header-inner text__header-inner"><div class="component__body text__body">---

</div></div></div></div></div></div></div></div><div class="block 643fe0189eaee20f20bcf20b background-color-white remove-padding-top"><div class="block__inner"><div class="component__container"><div class="component tabs 643fe01a9eaee20f20bcf24b is-full is-horizontal-layout zoom-img-enabled"><div class="tabs__inner component__inner"><div class="tabs__widget component__widget clearfix"><div class="tabs__content"><div class="tabs__content-inner"><div class="tabs__content-item item-0 is-active" id="bkmrk-organized-crime-seve-1"><div class="tabs__content-item-inner"><div class="tabs__content-item-title"><div class="tabs__content-item-title-inner">**Organized Crime**</div></div><div class="tabs__content-item-body"><div class="tabs__content-item-body-inner">Several years ago, the cybercrime industry took over the number-one spot, previously held by the drug trade, for the most profitable illegal industry. As you can imagine, it has attracted a new type of cybercriminal. Just as it did back in the days of Prohibition, organized crime goes where the money is. Organized crime consists of very well-funded and motivated groups that will typically use any and all of the latest attack techniques. Whether that is ransomware or data theft, if it can be monetized, organized crime will use it.  
</div>---

</div></div></div><div class="tabs__content-item item-1" id="bkmrk-hacktivists-this-typ"><div class="tabs__content-item-inner"><div class="tabs__content-item-title"><div class="tabs__content-item-title-inner">**Hacktivists**</div></div><div class="tabs__content-item-body"><div class="tabs__content-item-body-inner">This type of threat actor is not motivated by money. Hacktivists are looking to make a point or to further their beliefs, using cybercrime as their method of attack. These types of attacks are often carried out by stealing sensitive data and then revealing it to the public for the purpose of embarrassing or financially affecting a target.  
</div>---

</div></div></div><div class="tabs__content-item item-2" id="bkmrk-state-sponsored-atta"><div class="tabs__content-item-inner"><div class="tabs__content-item-title"><div class="tabs__content-item-title-inner">**State-Sponsored Attackers**</div></div><div class="tabs__content-item-body"><div class="tabs__content-item-body-inner">Cyber war and cyber espionage are two terms that fit into this category. Many governments around the world today use cyber attacks to steal information from their opponents and cause disruption. Many believe that the next Pearl Harbor will occur in cyberspace. That’s one of the reasons the United States declared cyberspace to be one of the operational domains that U.S. forces would be trained to defend.</div>---

</div></div></div><div class="tabs__content-item item-3" id="bkmrk-insider-threats"><div class="tabs__content-item-inner"><div class="tabs__content-item-title"><div class="tabs__content-item-title-inner">**Insider Threats** An insider threat is a threat that comes from inside an organization. The motivations of these types of actors are normally different from those of many of the other common threat actors. Insider threats are often normal employees who are tricked into divulging sensitive information or mistakenly clicking on links that allow attackers to gain access to their computers. However, they could also be malicious insiders who are possibly motivated by revenge or money.</div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>