# overview

<div class="courseBanner--g4799" id="bkmrk-arn-the-art-of-offen"><div class="row"><div class="col-md-12 col-lg-7 order-lg-1"><div class="courseDetails--mQUEW dbl-margin-right"><div><div><div class="desClass--tBsPv desView--0CZKq base-margin-top" title="Learn the art of offensive security to uncover cyber threats and vulnerabilities before the cybercriminals do. "><div class="article__title">  
i started ripping this course on August 30th of 2023 </div><div class="article__title">so some things may be a bit different if you take the course</div><div class="article__title">[https://skillsforall.com/course/ethical-hacker?courseLang=en-US](https://skillsforall.com/course/ethical-hacker?courseLang=en-US)  
---

<div aria-hidden="true" class="article__title-inner"></div></div></div><div class="desClass--tBsPv desView--0CZKq base-margin-top" title="Learn the art of offensive security to uncover cyber threats and vulnerabilities before the cybercriminals do. ">arn the art of offensive security to uncover cyber threats and vulnerabilities before the cybercriminals do.</div></div></div><div class="courseBannerBottom--YOcDd"><div class="row"><div class="courseBottomItem--WyBZs col"><div class="courseAttributeTitle--2HFQ1">SCHEDULEL: Aug 27, 2023 - Aug 30, 2024</div></div><div class="courseBottomItem--WyBZs col"><div class="courseAttributeTitle--2HFQ1">Language: English</div></div><div class="col"><div class="courseAttributeTitle--2HFQ1">Instructor: Victor Gevers<button class="btn btn--primary btn--large" type="button"></button></div></div></div></div></div></div></div></div><div class="tabContentWrapper--ozRIX" id="bkmrk-70-hours-intermediat"><div class="b2c_containerPadding--mLGeD"><div class="row"><div class="col-md-12 col-lg-5 order-lg-2"><div class="attributesContainer--oYfeK"><div class="attributesBlock--JQTfV"><div class="flex flex-wrap flex-between"><div class="attrBlock--I-etM">Estimated ammount of time required to complete: 70 Hours</div><div class="attrBlock--I-etM"><div class="attrTitle--yC95w">difficulty: Intermediate</div></div><div class="attrBlock--I-etM"><div class="attrTitle--yC95w">Number of labs: 34  
</div></div><div class="attrBlock--I-etM">pacing: Self-Paced</div></div></div>---

<div class="badgeContainer--329SZ">  
</div></div></div></div></div></div>### Instructor

<div class="tabContentWrapper--ozRIX" id="bkmrk-victor-gevers-overvi"><div class="b2c_containerPadding--mLGeD"><div class="row"><div class="col-md-12 col-lg-5 order-lg-2"><div class="attributesContainer--oYfeK"><div class="instructorBlock--SCneA">- <div class="flex flex-middle">![Victor Gevers](https://library.naruzkurai.com/uploads/images/gallery/2023-08/embedded-image-onlwu0np.png "Victor Gevers")<div class="staffName--ZBGOv text-size-16 text-bold base-margin-left">Victor Gevers</div></div>

</div></div></div><div class="col-md-12 col-lg-7 order-lg-1"><div class="tabBlock--nxVmH">- [<span class="tablink-inner">Overview</span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)
- [<span class="tablink-inner">Curriculum</span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)
- [<span class="tablink-inner">Resources</span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)

</div><div class="dbl-margin-top dbl-margin-bottom"><div><div class="dbl-margin-top text-size-12"><div><div data-gjs-type="wrapper" data-highlightable="1"><div class="" data-gjs-type="default" data-highlightable="1" draggable="true" id="bkmrk-the-digital-landscap">---

<span class="" data-gjs-type="text" data-highlightable="1" draggable="true" id="bkmrk-the-digital-landscap-1">The digital landscape is evolving at an unprecedented rate and cyber threats lurk around every corner. Cybersecurity resilience in the modern world cannot be just an add on - it's a necessity. Offensive security professionals like ethical hackers and penetration testers can help proactively discover unknown threats and address them before the cybercriminals do.   
  
This course is designed to prepare you with an Ethical Hacker skillset and give you a solid understanding of offensive security. You will become proficient in the art of scoping, executing, and reporting on vulnerability assessments, while recommending mitigation strategies. Follow an engaging gamified narrative throughout the course and get lots of practice with hands-on labs inspired by real-world scenarios.  
  
After completing this course, continue your cybersecurity career in offensive security as an ethical hacker or penetration tester. Or use this course to strengthen your defensive security knowledge. By understanding the mindset of threat actors, you will be able to more effectively implement security controls and monitor, analyze, and respond to current security threats.  
  
**Prerequisites:**   
[Junior Cybersecurity Analyst Career Path](https://skillsforall.com/career-path/cybersecurity), or equivalent entry-level cybersecurity knowledge  
Basic programming knowledge  
</span></div><div class="" data-gjs-type="default" data-highlightable="1" draggable="true">---

<div class="dbl-margin-top dbl-margin-bottom" id="bkmrk-what-you-will-learn."><div class="curriculumLearnLabel--YF99k">what you will learn.</div><div class="outlineContainer--xvcq6"><div class="nodeList--0Un1k viewOnlyMode--JU0N0 courseLaunch--qwId5"><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge]()</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Course Introduction</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active">![expand]()</div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height: 50em;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="Course Introduction">Course Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="Welcome to the Ethical Hacker Course">Welcome to the Ethical Hacker Course</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="The Fictional Companies in the Ethical Hacker Course">The Fictional Companies in the Ethical Hacker Course</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="What Will I Learn in This Course?">What Will I Learn in This Course?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="Ethical Hacking Statement">Ethical Hacking Statement</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/c929ed57-ee07-44ad-a2d4-7229fc85e043.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 1: Introduction to Ethical Hacking and Penetration Testing</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active">![expand]()</div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height: 1600px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="1.0. Introduction">1.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.0.1 Why Should I Take This Module?">1.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.0.2 What Will I Learn in This Module?">1.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="1.1. Understanding Ethical Hacking and Penetration Testing">1.1. Understanding Ethical Hacking and Penetration Testing</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.1.1 Overview">1.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.1.2 Why Do We Need to Do Penetration Testing?">1.1.2 Why Do We Need to Do Penetration Testing?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.1.3 Lab - Researching PenTesting Careers">1.1.3 Lab - Researching PenTesting Careers</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.1.4 Threat Actors">1.1.4 Threat Actors</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="1.2. Exploring Penetration Testing Methodologies">1.2. Exploring Penetration Testing Methodologies</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.2.1 Overview">1.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.2.2 Why Do We Need to Follow a Methodology for Penetration Testing?">1.2.2 Why Do We Need to Follow a Methodology for Penetration Testing?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.2.3 Environmental Considerations">1.2.3 Environmental Considerations</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.2.4 Practice - Types of Penetration Tests">1.2.4 Practice - Types of Penetration Tests</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.2.5 Surveying Different Standards and Methodologies">1.2.5 Surveying Different Standards and Methodologies</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.2.6 Lab - Compare Pentesting Methodologies">1.2.6 Lab - Compare Pentesting Methodologies</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="1.3. Building Your Own Lab">1.3. Building Your Own Lab</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.3.1 Overview">1.3.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.3.2 Requirements and Guidelines for Penetration Testing Labs">1.3.2 Requirements and Guidelines for Penetration Testing Labs</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.3.3 What Tools Should You Use in Your Lab?">1.3.3 What Tools Should You Use in Your Lab?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.3.4 Practice - Requirements and Guidelines for Penetration Testing Labs">1.3.4 Practice - Requirements and Guidelines for Penetration Testing Labs</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.3.5 What If You Break Something?">1.3.5 What If You Break Something?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.3.6 Lab - Deploy a Pre-Built Kali Linux Virtual Machine (VM)">1.3.6 Lab - Deploy a Pre-Built Kali Linux Virtual Machine (VM)</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.3.7 Lab - Investigate Kali Linux">1.3.7 Lab - Investigate Kali Linux</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="1.4. Summary">1.4. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.4.1 What Did I Learn in this Module?">1.4.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.4.2 Reflection Questions">1.4.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="1.4.3 Quiz - Introduction to Ethical Hacking and Penetration Testing">1.4.3 Quiz - Introduction to Ethical Hacking and Penetration Testing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/9e20fed5-aa76-4202-9903-ef71db5cbc24.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 2: Planning and Scoping a Penetration Testing Assessment</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active">![expand]()</div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height: 1850px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="2.0. Introduction">2.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.0.1 Why Should I Take This Module?">2.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.0.2 What Will I Learn in This Module?">2.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="2.1. Comparing and Contrasting Governance, Risk, and Compliance Concepts">2.1. Comparing and Contrasting Governance, Risk, and Compliance Concepts</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.1.1 Overview">2.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.1.2 Regulatory Compliance Considerations">2.1.2 Regulatory Compliance Considerations</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.1.3 Local Restrictions">2.1.3 Local Restrictions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.1.4 Practice - Regulations">2.1.4 Practice - Regulations</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.1.5 Legal Concepts">2.1.5 Legal Concepts</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.1.6 Contracts">2.1.6 Contracts</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.1.7 Disclaimers">2.1.7 Disclaimers</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.1.8 Practice - Legal Concepts">2.1.8 Practice - Legal Concepts</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.1.9 Lab - Compliance Requirements and Local Restrictions">2.1.9 Lab - Compliance Requirements and Local Restrictions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="2.2. Explaining the Importance of Scoping and Organizational or Customer Requirements">2.2. Explaining the Importance of Scoping and Organizational or Customer Requirements</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.2.1 Overview">2.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.2.2 Rules of Engagement">2.2.2 Rules of Engagement</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.2.3 Practice - Rules of Engagement">2.2.3 Practice - Rules of Engagement</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.2.4 Target List and In-Scope Assets">2.2.4 Target List and In-Scope Assets</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.2.5 Practice - Target List and In-Scope Assets">2.2.5 Practice - Target List and In-Scope Assets</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.2.6 Validating the Scope of Engagement">2.2.6 Validating the Scope of Engagement</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.2.7 Strategy: Unknown vs. Known Environment Testing">2.2.7 Strategy: Unknown vs. Known Environment Testing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.2.8 Practice - Strategy: Unknown vs. Known Environment Testing">2.2.8 Practice - Strategy: Unknown vs. Known Environment Testing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.2.9 Lab - Pre-Engagement Scope and Planning">2.2.9 Lab - Pre-Engagement Scope and Planning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.2.10 Lab - Create a Pentesting Agreement">2.2.10 Lab - Create a Pentesting Agreement</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="2.3. Demonstrating an Ethical Hacking Mindset by Maintaining Professionalism and Integrity">2.3. Demonstrating an Ethical Hacking Mindset by Maintaining Professionalism and Integrity</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.3.1 Overview">2.3.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.3.2 Practice - Demonstrate an Ethical Hacking Mindset">2.3.2 Practice - Demonstrate an Ethical Hacking Mindset</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.3.3 Lab - Personal Code of Conduct">2.3.3 Lab - Personal Code of Conduct</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="2.4. Summary">2.4. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.4.1 What Did I Learn in this Module?">2.4.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.4.2 Reflection Questions">2.4.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="2.4.3 Quiz - Planning and Scoping a Penetration Testing Assessment">2.4.3 Quiz - Planning and Scoping a Penetration Testing Assessment</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/2356c61c-147f-48ab-acd2-cf0c9ed70aae.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 3: Information Gathering and Vulnerability Scanning</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active">![expand]()</div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height: 2950px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="3.0. Introduction">3.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.0.1 Why Should I Take This Module?">3.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.0.2 What Will I Learn in This Module?">3.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="3.1. Performing Passive Reconnaissance">3.1. Performing Passive Reconnaissance</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.1 Overview">3.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.2 Active Reconnaissance vs. Passive Reconnaissance">3.1.2 Active Reconnaissance vs. Passive Reconnaissance</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.3 Practice - Active Reconnaissance vs. Passive Reconnaissance">3.1.3 Practice - Active Reconnaissance vs. Passive Reconnaissance</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.4 Lab - Using OSINT Tools">3.1.4 Lab - Using OSINT Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.5 DNS Lookups">3.1.5 DNS Lookups</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.6 Practice - DNS Lookups">3.1.6 Practice - DNS Lookups</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.7 Identification of Technical and Administrative Contacts">3.1.7 Identification of Technical and Administrative Contacts</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.8 Practice - Identification of Technical and Administrative Contracts">3.1.8 Practice - Identification of Technical and Administrative Contracts</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.9 Lab - DNS Lookups">3.1.9 Lab - DNS Lookups</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.10 Cloud vs. Self-Hosted Applications and Related Subdomains">3.1.10 Cloud vs. Self-Hosted Applications and Related Subdomains</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.11 Social Media Scraping">3.1.11 Social Media Scraping</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.12 Lab - Employee Intelligence Gathering">3.1.12 Lab - Employee Intelligence Gathering</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.13 Cryptographic Flaws">3.1.13 Cryptographic Flaws</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.14 Lab - Finding Information from SSL Certificates">3.1.14 Lab - Finding Information from SSL Certificates</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.15 Company Reputation and Security Posture">3.1.15 Company Reputation and Security Posture</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.16 Practice - File Metadata">3.1.16 Practice - File Metadata</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.17 Practice - Web Archiving, Caching, and Public Code Repositories">3.1.17 Practice - Web Archiving, Caching, and Public Code Repositories</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.18 Lab - Finding Out About the Organization">3.1.18 Lab - Finding Out About the Organization</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.19 Lab - Advanced Searches">3.1.19 Lab - Advanced Searches</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.20 Open-Source Intelligence (OSINT) Gathering">3.1.20 Open-Source Intelligence (OSINT) Gathering</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.1.21 Lab - Shodan Searches">3.1.21 Lab - Shodan Searches</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="3.2. Performing Active Reconnaissance">3.2. Performing Active Reconnaissance</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.2.1 Overview">3.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.2.2 Nmap Scan Types">3.2.2 Nmap Scan Types</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.2.3 Practice - Nmap Scan Types">3.2.3 Practice - Nmap Scan Types</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.2.4 Types of Enumeration">3.2.4 Types of Enumeration</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.2.5 Practice - Exploring Enumeration via Packet Crafting with Scapy">3.2.5 Practice - Exploring Enumeration via Packet Crafting with Scapy</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.2.6 Lab - Enumeration with Nmap">3.2.6 Lab - Enumeration with Nmap</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.2.7 Packet Inspection and Eavesdropping">3.2.7 Packet Inspection and Eavesdropping</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.2.8 Practice - Packet Inspection and Eavesdropping">3.2.8 Practice - Packet Inspection and Eavesdropping</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.2.9 Lab - Packet Crafting with Scapy">3.2.9 Lab - Packet Crafting with Scapy</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.2.10 Lab - Network Sniffing with Wireshark">3.2.10 Lab - Network Sniffing with Wireshark</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="3.3. Understanding the Art of Performing Vulnerability Scans">3.3. Understanding the Art of Performing Vulnerability Scans</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.3.1 Overview">3.3.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.3.2 How a Typical Automated Vulnerability Scanner Works">3.3.2 How a Typical Automated Vulnerability Scanner Works</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.3.3 Practice - How a Typical Automated Vulnerability Scanner Works">3.3.3 Practice - How a Typical Automated Vulnerability Scanner Works</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.3.4 Types of Vulnerability Scans">3.3.4 Types of Vulnerability Scans</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.3.5 Practice - Types of Vulnerability Scans">3.3.5 Practice - Types of Vulnerability Scans</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.3.6 Lab - Vulnerability Scanning with Kali Tools">3.3.6 Lab - Vulnerability Scanning with Kali Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.3.7 Challenges to Consider When Running a Vulnerability Scan">3.3.7 Challenges to Consider When Running a Vulnerability Scan</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="3.4. Understanding How to Analyze Vulnerability Scan Results">3.4. Understanding How to Analyze Vulnerability Scan Results</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.4.1 Overview">3.4.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.4.2 Sources for Further Investigation of Vulnerabilities">3.4.2 Sources for Further Investigation of Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.4.3 Lab - Investigate Vulnerability Information Sources">3.4.3 Lab - Investigate Vulnerability Information Sources</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.4.4 How to Deal with a Vulnerability">3.4.4 How to Deal with a Vulnerability</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="3.5. Summary">3.5. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.5.1 What Did I Learn in this Module?">3.5.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.5.2 Reflection Questions">3.5.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="3.5.3 Quiz - Information Gathering and Vulnerability Scanning">3.5.3 Quiz - Information Gathering and Vulnerability Scanning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/42172e76-b06c-425c-a159-fab770abd18b.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 4: Social Engineering Attacks</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active">![expand]()</div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height: 2250px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="4.0. Introduction">4.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.0.1 Why Should I Take This Module?">4.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.0.2 What Will I Learn in This Module?">4.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="4.1. Pretexting for an Approach and Impersonation">4.1. Pretexting for an Approach and Impersonation</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.1.1 Overview">4.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.1.2 Practice - Pretexting and Impersonation">4.1.2 Practice - Pretexting and Impersonation</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="4.2. Social Engineering Attacks">4.2. Social Engineering Attacks</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.2.1 Overview">4.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.2.2 Email Phishing">4.2.2 Email Phishing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.2.3 Vishing">4.2.3 Vishing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.2.4 Short Message Service (SMS) Phishing">4.2.4 Short Message Service (SMS) Phishing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.2.5 Universal Serial Bus (USB) Drop Key">4.2.5 Universal Serial Bus (USB) Drop Key</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.2.6 Watering Hole Attacks">4.2.6 Watering Hole Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.2.7 Practice - Pivot Attack">4.2.7 Practice - Pivot Attack</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.2.8 Practice - Social Engineering Attacks">4.2.8 Practice - Social Engineering Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="4.3. Physical Attacks">4.3. Physical Attacks</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.3.1 Overview">4.3.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.3.2 Tailgating">4.3.2 Tailgating</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.3.3 Dumpster Diving">4.3.3 Dumpster Diving</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.3.4 Shoulder Surfing">4.3.4 Shoulder Surfing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.3.5 Badge Cloning">4.3.5 Badge Cloning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.3.6 Practice - Physical Attacks">4.3.6 Practice - Physical Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="4.4. Social Engineering Tools">4.4. Social Engineering Tools</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.4.1 Overview">4.4.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.4.2 Social-Engineer Toolkit (SET)">4.4.2 Social-Engineer Toolkit (SET)</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.4.3 Browser Exploitation Framework (BeEF)">4.4.3 Browser Exploitation Framework (BeEF)</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.4.4 Practice - Browser Exploitation Framework">4.4.4 Practice - Browser Exploitation Framework</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.4.5 Call Spoofing Tools">4.4.5 Call Spoofing Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.4.6 Practice - Call Spoofing Tools">4.4.6 Practice - Call Spoofing Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.4.7 Lab - Explore the Social Engineer Toolkit (SET)">4.4.7 Lab - Explore the Social Engineer Toolkit (SET)</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.4.8 Lab - Using the Browser Exploitation Framework (BeEF)">4.4.8 Lab - Using the Browser Exploitation Framework (BeEF)</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="4.5. Methods of Influence">4.5. Methods of Influence</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.5.1 Overview">4.5.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.5.2 Practice - Methods of Influence">4.5.2 Practice - Methods of Influence</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="4.6. Summary">4.6. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.6.1 What Did I Learn in this Module?">4.6.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.6.2 Reflection Questions">4.6.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="4.6.3 Quiz - Social Engineering Attacks">4.6.3 Quiz - Social Engineering Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/387e65fb-148f-4e22-93ce-0516bee9175e.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 5: Exploiting Wired and Wireless Networks</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active">![expand]()</div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height: 2750px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="5.0. Introduction">5.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.0.1 Why Should I Take This Module?">5.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.0.2 What Will I Learn in This Module?">5.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="5.1. Exploiting Network-Based Vulnerabilities">5.1. Exploiting Network-Based Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.1 Overview">5.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.2 Windows Name Resolution and SMB Attacks">5.1.2 Windows Name Resolution and SMB Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.3 Practice - Windows Name Resolution and SMB Attacks">5.1.3 Practice - Windows Name Resolution and SMB Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.4 Lab - Scanning for SMB Vulnerabilities with enum4linux">5.1.4 Lab - Scanning for SMB Vulnerabilities with enum4linux</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.5 DNS Cache Poisoning">5.1.5 DNS Cache Poisoning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.6 Practice - DNS Cache Poisoning">5.1.6 Practice - DNS Cache Poisoning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.7 SNMP Exploits">5.1.7 SNMP Exploits</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.8 SMTP Exploits">5.1.8 SMTP Exploits</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.9 Practice - SMTP Commands">5.1.9 Practice - SMTP Commands</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.10 FTP Exploits">5.1.10 FTP Exploits</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.11 Pass-the-Hash Attacks">5.1.11 Pass-the-Hash Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.12 Kerberos and LDAP-Based Attacks">5.1.12 Kerberos and LDAP-Based Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.13 Kerberoasting">5.1.13 Kerberoasting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.14 On-Path Attacks">5.1.14 On-Path Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.15 Practice - Kerberos, LDAP, and On-Path Attacks">5.1.15 Practice - Kerberos, LDAP, and On-Path Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.16 Lab - On-Path Attacks with Ettercap">5.1.16 Lab - On-Path Attacks with Ettercap</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.17 Route Manipulation Attacks">5.1.17 Route Manipulation Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.18 DoS and DDoS Attacks">5.1.18 DoS and DDoS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.19 Practice - DoS and DDoS Attacks">5.1.19 Practice - DoS and DDoS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.20 Network Access Control (NAC) Bypass">5.1.20 Network Access Control (NAC) Bypass</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.21 VLAN Hopping">5.1.21 VLAN Hopping</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.22 Practice - NAC Bypass and VLAN Hopping">5.1.22 Practice - NAC Bypass and VLAN Hopping</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.23 DHCP Starvation Attacks and Rogue DHCP Servers">5.1.23 DHCP Starvation Attacks and Rogue DHCP Servers</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.1.24 Practice - DHCP Starvation and Rogue DHCP Servers">5.1.24 Practice - DHCP Starvation and Rogue DHCP Servers</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="5.2. Exploiting Wireless Vulnerabilities">5.2. Exploiting Wireless Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.1 Overview">5.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.2 Rogue Access Points">5.2.2 Rogue Access Points</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.3 Evil Twin Attacks">5.2.3 Evil Twin Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.4 Disassociation (or Deauthentication) Attacks">5.2.4 Disassociation (or Deauthentication) Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.5 Preferred Network List Attacks">5.2.5 Preferred Network List Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.6 Wireless Signal Jamming and Interference">5.2.6 Wireless Signal Jamming and Interference</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.7 War Driving">5.2.7 War Driving</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.8 Initialization Vector (IV) Attacks and Unsecured Wireless Protocols">5.2.8 Initialization Vector (IV) Attacks and Unsecured Wireless Protocols</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.9 KARMA Attacks">5.2.9 KARMA Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.10 Fragmentation Attacks">5.2.10 Fragmentation Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.11 Practice - IV, Unsecured Wireless, KARMA, and Fragmentation Attacks">5.2.11 Practice - IV, Unsecured Wireless, KARMA, and Fragmentation Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.12 Credential Harvesting">5.2.12 Credential Harvesting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.13 Bluejacking and Bluesnarfing">5.2.13 Bluejacking and Bluesnarfing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.14 Bluetooth Low Energy (BLE) Attacks">5.2.14 Bluetooth Low Energy (BLE) Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.15 Radio-Frequency Identification (RFID) Attacks">5.2.15 Radio-Frequency Identification (RFID) Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.16 Password Spraying">5.2.16 Password Spraying</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.17 Exploit Chaining">5.2.17 Exploit Chaining</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.2.18 Practice - Wireless Attacks">5.2.18 Practice - Wireless Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="5.3. Summary">5.3. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.3.1 What Did I Learn in this Module?">5.3.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.3.2 Reflection Questions">5.3.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="5.3.3 Quiz - Exploiting Wired and Wireless Networks">5.3.3 Quiz - Exploiting Wired and Wireless Networks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/ae18768b-d407-407a-8033-8102f34cc278.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 6: Exploiting Application-Based Vulnerabilities</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active">![expand]()</div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height: 4750px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.0. Introduction">6.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.0.1 Why Should I Take This Module?">6.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.0.2 What Will I Learn in This Module?">6.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.1. Overview of Web Application-Based Attacks for Security Professionals and the OWASP Top 10">6.1. Overview of Web Application-Based Attacks for Security Professionals and the OWASP Top 10</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.1.1 Overview">6.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.1.2 The HTTP Protocol">6.1.2 The HTTP Protocol</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.1.3 Practice - The HTTP Protocol">6.1.3 Practice - The HTTP Protocol</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.1.4 Web Sessions">6.1.4 Web Sessions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.1.5 Practice - Web Sessions">6.1.5 Practice - Web Sessions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.1.6 OWASP Top 10">6.1.6 OWASP Top 10</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.1.7 Lab - Website Vulnerability Scanning">6.1.7 Lab - Website Vulnerability Scanning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.1.8 Lab - Using the GVM Vulnerability Scanner">6.1.8 Lab - Using the GVM Vulnerability Scanner</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.2. How to Build Your Own Web Application Lab">6.2. How to Build Your Own Web Application Lab</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.2.1 Overview">6.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.3. Understanding Business Logic Flaws">6.3. Understanding Business Logic Flaws</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.3.1 Overview">6.3.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.3.2 Practice - Business Logic Flaws">6.3.2 Practice - Business Logic Flaws</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.4. Understanding Injection-Based Vulnerabilities">6.4. Understanding Injection-Based Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.4.1 Overview">6.4.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.4.2 SQL Injection Vulnerabilities">6.4.2 SQL Injection Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.4.3 Practice - SQL Injection Attacks">6.4.3 Practice - SQL Injection Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.4.4 Command Injection Vulnerabilities">6.4.4 Command Injection Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.4.5 Practice - Command Injection Vulnerabilities">6.4.5 Practice - Command Injection Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.4.6 Lightweight Directory Access Protocol (LDAP) Injection Vulnerabilities">6.4.6 Lightweight Directory Access Protocol (LDAP) Injection Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.4.7 Lab - Injection Attacks">6.4.7 Lab - Injection Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.5. Exploiting Authentication-Based Vulnerabilities">6.5. Exploiting Authentication-Based Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.5.1 Overview">6.5.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.5.2 Session Hijacking">6.5.2 Session Hijacking</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.5.3 Practice - Session Hijacking">6.5.3 Practice - Session Hijacking</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.5.4 Redirect Attacks">6.5.4 Redirect Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.5.5 Default Credentials">6.5.5 Default Credentials</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.5.6 Kerberos Vulnerabilities">6.5.6 Kerberos Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.5.7 Practice - Kerberos Vulnerabilities">6.5.7 Practice - Kerberos Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.5.8 Lab - Using Password Tools">6.5.8 Lab - Using Password Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.6. Exploiting Authorization-Based Vulnerabilities">6.6. Exploiting Authorization-Based Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.6.1 Overview">6.6.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.6.2 Parameter Pollution">6.6.2 Parameter Pollution</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.6.3 Practice - Parameter Pollution">6.6.3 Practice - Parameter Pollution</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.6.4 Insecure Direct Object Reference Vulnerabilities">6.6.4 Insecure Direct Object Reference Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.6.5 Practice - Insecure Direct Object Reference Vulnerabilities">6.6.5 Practice - Insecure Direct Object Reference Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.7. Understanding Cross-Site Scripting (XSS) Vulnerabilities">6.7. Understanding Cross-Site Scripting (XSS) Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.7.1 Overview">6.7.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.7.2 Reflected XSS Attacks">6.7.2 Reflected XSS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.7.3 Practice - Reflected XSS Attacks">6.7.3 Practice - Reflected XSS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.7.4 Stored XSS Attacks">6.7.4 Stored XSS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.7.5 Practice - Stored XSS Attacks">6.7.5 Practice - Stored XSS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.7.6 XSS Evasion Techniques">6.7.6 XSS Evasion Techniques</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.7.7 XSS Mitigations">6.7.7 XSS Mitigations</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.7.8 Lab - Cross Site Scripting">6.7.8 Lab - Cross Site Scripting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.8. Understanding Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery Attacks">6.8. Understanding Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery Attacks</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.8.1 Overview">6.8.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.8.2 Practice - CSRF/XSRF Attacks">6.8.2 Practice - CSRF/XSRF Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.9. Understanding Clickjacking">6.9. Understanding Clickjacking</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.9.1 Overview">6.9.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.10. Exploiting Security Misconfigurations">6.10. Exploiting Security Misconfigurations</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.10.1 Overview">6.10.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.10.2 Exploiting Directory Traversal Vulnerabilities">6.10.2 Exploiting Directory Traversal Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.10.3 Practice - Directory Transversal">6.10.3 Practice - Directory Transversal</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.10.4 Cookie Manipulation Attacks">6.10.4 Cookie Manipulation Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.11. Exploiting File Inclusion Vulnerabilities">6.11. Exploiting File Inclusion Vulnerabilities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.11.1 Overview">6.11.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.11.2 Local File Inclusion Vulnerabilities">6.11.2 Local File Inclusion Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.11.3 Remote File Inclusion Vulnerabilities">6.11.3 Remote File Inclusion Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.12. Exploiting Insecure Code Practices">6.12. Exploiting Insecure Code Practices</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.12.1 Overview">6.12.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.12.2 Comments in Source Code">6.12.2 Comments in Source Code</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.12.3 Lack of Error Handling and Overly Verbose Error Handling">6.12.3 Lack of Error Handling and Overly Verbose Error Handling</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.12.4 Practice - Insecure Code">6.12.4 Practice - Insecure Code</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.12.5 Hard-Coded Credentials">6.12.5 Hard-Coded Credentials</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.12.6 Race Conditions">6.12.6 Race Conditions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.12.7 Unprotected APIs">6.12.7 Unprotected APIs</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.12.8 Practice - Unprotected APIs">6.12.8 Practice - Unprotected APIs</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.12.9 Hidden Elements">6.12.9 Hidden Elements</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.12.10 Lack of Code Signing">6.12.10 Lack of Code Signing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.12.11 Additional Web Application Hacking Tools">6.12.11 Additional Web Application Hacking Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.12.12 Practice - Web Hacking Tools">6.12.12 Practice - Web Hacking Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.12.13 Lab - Use the OWASP Web Security Testing Guide">6.12.13 Lab - Use the OWASP Web Security Testing Guide</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="6.13. Summary">6.13. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.13.1 What Did I Learn in this Module?">6.13.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.13.2 Reflection Questions">6.13.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="6.13.3 Quiz - Performing Post-Exploitation Techniques">6.13.3 Quiz - Performing Post-Exploitation Techniques</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/3aafb093-6ae4-43ed-a63a-5fda0ff72d50.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 7: Cloud, Mobile, and IoT Security</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active">![expand]()</div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height: 2100px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="7.0. Introduction">7.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.0.1 Why Should I Take This Module?">7.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.0.2 What Will I Learn in This Module?">7.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="7.1. Researching Attack Vectors and Performing Attacks on Cloud Technologies">7.1. Researching Attack Vectors and Performing Attacks on Cloud Technologies</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.1.1 Overview">7.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.1.2 Practice - Types of Cloud Services">7.1.2 Practice - Types of Cloud Services</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.1.3 Credential Harvesting">7.1.3 Credential Harvesting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.1.4 Practice - Credential Harvesting">7.1.4 Practice - Credential Harvesting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.1.5 Privilege Escalation">7.1.5 Privilege Escalation</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.1.6 Account Takeover">7.1.6 Account Takeover</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.1.7 Metadata Service Attacks">7.1.7 Metadata Service Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.1.8 Attacks Against Misconfigured Cloud Assets">7.1.8 Attacks Against Misconfigured Cloud Assets</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.1.9 Resource Exhaustion and DoS Attacks">7.1.9 Resource Exhaustion and DoS Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.1.10 Cloud Malware Injection Attacks">7.1.10 Cloud Malware Injection Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.1.11 Side-Channel Attacks">7.1.11 Side-Channel Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.1.12 Practice - Cloud Attack Types">7.1.12 Practice - Cloud Attack Types</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.1.13 Tools and Software Development Kits (SDKs)">7.1.13 Tools and Software Development Kits (SDKs)</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="7.2. Explaining Common Attacks and Vulnerabilities Against Specialized Systems">7.2. Explaining Common Attacks and Vulnerabilities Against Specialized Systems</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.1 Overview">7.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.2 Attacking Mobile Devices">7.2.2 Attacking Mobile Devices</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.3 Practice - Mobile Device Vulnerabilities">7.2.3 Practice - Mobile Device Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.4 Practice - Attacking Mobile Devices">7.2.4 Practice - Attacking Mobile Devices</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.5 Attacking Internet of Things (IoT) Devices">7.2.5 Attacking Internet of Things (IoT) Devices</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.6 Analyzing IoT Protocols">7.2.6 Analyzing IoT Protocols</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.7 Practice - Analyzing IoT Protocols">7.2.7 Practice - Analyzing IoT Protocols</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.8 IoT Security Special Considerations">7.2.8 IoT Security Special Considerations</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.9 Common IoT Vulnerabilities">7.2.9 Common IoT Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.10 Practice - Common IoT Vulnerabilities">7.2.10 Practice - Common IoT Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.11 Data Storage System Vulnerabilities">7.2.11 Data Storage System Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.12 Management Interface Vulnerabilities">7.2.12 Management Interface Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.13 Practice - Management Interface Vulnerabilities">7.2.13 Practice - Management Interface Vulnerabilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.14 Exploiting Virtual Machines">7.2.14 Exploiting Virtual Machines</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.15 Vulnerabilities Related to Containerized Workloads">7.2.15 Vulnerabilities Related to Containerized Workloads</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.2.16 Practice - Vulnerabilities Related to Containerized Workloads">7.2.16 Practice - Vulnerabilities Related to Containerized Workloads</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="7.3. Summary">7.3. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.3.1 What Did I Learn in this Module?">7.3.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.3.2 Reflection Questions">7.3.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="7.3.3 Quiz - Cloud, Mobile, and IoT Security">7.3.3 Quiz - Cloud, Mobile, and IoT Security</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/033c4cdd-4f5b-4782-8bcc-4716e0e96a17.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 8: Performing Post-Exploitation Techniques</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active">![expand]()</div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height: 1450px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="8.0. Introduction">8.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.0.1 Why Should I Take This Module?">8.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.0.2 What Will I Learn in This Module?">8.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="8.1. Creating a Foothold and Maintaining Persistence After Compromising a System">8.1. Creating a Foothold and Maintaining Persistence After Compromising a System</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.1.1 Overview">8.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.1.2 Reverse and Bind Shells">8.1.2 Reverse and Bind Shells</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.1.3 Practice - Reverse and Bind Shells">8.1.3 Practice - Reverse and Bind Shells</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.1.4 Command and Control (C2) Utilities">8.1.4 Command and Control (C2) Utilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.1.5 Practice - Types of C2 Utilities">8.1.5 Practice - Types of C2 Utilities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.1.6 Scheduled Jobs and Tasks">8.1.6 Scheduled Jobs and Tasks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.1.7 Custom Daemons, Processes, and Additional Backdoors">8.1.7 Custom Daemons, Processes, and Additional Backdoors</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.1.8 New Users">8.1.8 New Users</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="8.2. Understanding How to Perform Lateral Movement, Detection Avoidance, and Enumeration">8.2. Understanding How to Perform Lateral Movement, Detection Avoidance, and Enumeration</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.2.1 Overview">8.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.2.2 Post-Exploitation Scanning">8.2.2 Post-Exploitation Scanning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.2.3 Legitimate Utilities and Living-off-the-Land">8.2.3 Legitimate Utilities and Living-off-the-Land</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.2.4 Practice - Post Exploitation">8.2.4 Practice - Post Exploitation</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.2.5 Post-Exploitation Privilege Escalation">8.2.5 Post-Exploitation Privilege Escalation</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.2.6 Practice - Post Exploitation Privilege Escalation">8.2.6 Practice - Post Exploitation Privilege Escalation</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.2.7 How to Cover Your Tracks">8.2.7 How to Cover Your Tracks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.2.8 Practice - Steganography">8.2.8 Practice - Steganography</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="8.3. Summary">8.3. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.3.1 What Did I Learn in this Module?">8.3.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.3.2 Reflection Questions">8.3.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="8.3.3 Quiz - Performing Post-Exploitation Techniques">8.3.3 Quiz - Performing Post-Exploitation Techniques</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/79cdd9d1-cefb-44de-bdfe-59cc4309440b.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 9: Reporting and Communication</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active">![expand]()</div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height: 2100px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="9.0. Introduction">9.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.0.1 Why Should I Take This Module?">9.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.0.2 What Will I Learn in This Module?">9.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="9.1. Comparing and Contrasting Important Components of Written Reports">9.1. Comparing and Contrasting Important Components of Written Reports</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.1.1 Overview">9.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.1.2 Report Contents">9.1.2 Report Contents</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.1.3 Practice - Penetration Reporting">9.1.3 Practice - Penetration Reporting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.1.4 Storage Time for Report and Secure Distribution">9.1.4 Storage Time for Report and Secure Distribution</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.1.5 Practice - Control and Distribution of Reports">9.1.5 Practice - Control and Distribution of Reports</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.1.6 Note Taking">9.1.6 Note Taking</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.1.7 Common Themes/Root Causes">9.1.7 Common Themes/Root Causes</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.1.8 Practice - Common Themes/Root Causes">9.1.8 Practice - Common Themes/Root Causes</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.1.9 Lab - Explore PenTest Reports">9.1.9 Lab - Explore PenTest Reports</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="9.2. Analyzing the Findings and Recommending the Appropriate Remediation Within a Report">9.2. Analyzing the Findings and Recommending the Appropriate Remediation Within a Report</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.2.1 Overview">9.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.2.2 Technical Controls">9.2.2 Technical Controls</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.2.3 Administrative Controls">9.2.3 Administrative Controls</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.2.4 Operational Controls">9.2.4 Operational Controls</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.2.5 Physical Controls">9.2.5 Physical Controls</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.2.6 Practice - Recommended Controls">9.2.6 Practice - Recommended Controls</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.2.7 Lab - Recommend Remediation Based on Findings">9.2.7 Lab - Recommend Remediation Based on Findings</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="9.3. Explaining the Importance of Communication During the Penetration Testing Process">9.3. Explaining the Importance of Communication During the Penetration Testing Process</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.3.1 Overview">9.3.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.3.2 Communication Triggers">9.3.2 Communication Triggers</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.3.3 Practice - Communication Triggers">9.3.3 Practice - Communication Triggers</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.3.4 Reasons for Communication">9.3.4 Reasons for Communication</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.3.5 Goal Reprioritization and Presentation of Findings">9.3.5 Goal Reprioritization and Presentation of Findings</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="9.4. Explaining Post-Report Delivery Activities">9.4. Explaining Post-Report Delivery Activities</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.4.1 Overview">9.4.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.4.2 Post-Engagement Cleanup">9.4.2 Post-Engagement Cleanup</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.4.3 Additional Post-Report Delivery Activities">9.4.3 Additional Post-Report Delivery Activities</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.4.4 Practice - Post Report Delivery">9.4.4 Practice - Post Report Delivery</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="9.5. Summary">9.5. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.5.1 What Did I Learn in this Module?">9.5.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.5.2 Reflection Questions">9.5.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="9.5.3 Quiz - Reporting and Communication">9.5.3 Quiz - Reporting and Communication</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/3352c9d8-875c-42fd-8058-09f932d0074b.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Module 10: Tools and Code Analysis</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active">![expand]()</div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height: 2950px;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="10.0. Introduction">10.0. Introduction</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.0.1 Why Should I Take This Module?">10.0.1 Why Should I Take This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.0.2 What Will I Learn in This Module?">10.0.2 What Will I Learn in This Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="10.1. Understanding the Basic Concepts of Scripting and Software Development">10.1. Understanding the Basic Concepts of Scripting and Software Development</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.1 Overview">10.1.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.2 Logic Constructs">10.1.2 Logic Constructs</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.3 Practice - Logic Constructs">10.1.3 Practice - Logic Constructs</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.4 Data Structures">10.1.4 Data Structures</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.5 Practice - Data Structures">10.1.5 Practice - Data Structures</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.6 Libraries">10.1.6 Libraries</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.7 Procedures">10.1.7 Procedures</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.8 Functions">10.1.8 Functions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.9 Classes">10.1.9 Classes</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.10 Analysis of Scripts and Code Samples for Use in Penetration Testing">10.1.10 Analysis of Scripts and Code Samples for Use in Penetration Testing</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.11 Practice - Scripting">10.1.11 Practice - Scripting</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.12 The Bash Shell">10.1.12 The Bash Shell</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.13 Resources to Learn Python">10.1.13 Resources to Learn Python</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.14 Resources to Learn Ruby">10.1.14 Resources to Learn Ruby</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.15 Resources to Learn PowerShell">10.1.15 Resources to Learn PowerShell</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.16 Resources to Learn Perl">10.1.16 Resources to Learn Perl</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.17 Resources to Learn JavaScript">10.1.17 Resources to Learn JavaScript</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.18 Practice - Programming Languages">10.1.18 Practice - Programming Languages</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.19 Lab - Analyze Exploit Code">10.1.19 Lab - Analyze Exploit Code</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.1.20 Lab - Analyze Automation Code">10.1.20 Lab - Analyze Automation Code</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="10.2. Understanding the Different Use Cases of Penetration Testing Tools and Analyzing Exploit Code">10.2. Understanding the Different Use Cases of Penetration Testing Tools and Analyzing Exploit Code</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.1 Overview">10.2.1 Overview</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.2 Penetration Testing - Focused Linux Distributions">10.2.2 Penetration Testing - Focused Linux Distributions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.3 Common Tools for Reconnaissance and Enumeration">10.2.3 Common Tools for Reconnaissance and Enumeration</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.4 Practice - Common Tools for Reconnaissance and Enumeration">10.2.4 Practice - Common Tools for Reconnaissance and Enumeration</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.5 Common Tools for Vulnerability Scanning">10.2.5 Common Tools for Vulnerability Scanning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.6 Practice - Common Tools for Vulnerability Scanning">10.2.6 Practice - Common Tools for Vulnerability Scanning</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.7 Common Tools for Credential Attacks">10.2.7 Common Tools for Credential Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.8 Practice - Common Tools for Credential Attacks">10.2.8 Practice - Common Tools for Credential Attacks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.9 Common Tools for Persistence">10.2.9 Common Tools for Persistence</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.10 Practice - Common Tools for Persistence">10.2.10 Practice - Common Tools for Persistence</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.11 Common Tools for Evasion">10.2.11 Common Tools for Evasion</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.12 Practice - Common Tools for Evasion">10.2.12 Practice - Common Tools for Evasion</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.13 Exploitation Frameworks">10.2.13 Exploitation Frameworks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.14 Practice - Exploitation Frameworks">10.2.14 Practice - Exploitation Frameworks</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.15 Common Decompilation, Disassembly, and Debugging Tools">10.2.15 Common Decompilation, Disassembly, and Debugging Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.16 Practice - Common Decompilation, Disassembly, and Debugging Tools">10.2.16 Practice - Common Decompilation, Disassembly, and Debugging Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.17 Common Tools for Forensics">10.2.17 Common Tools for Forensics</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.18 Practice - Common Tools for Forensics">10.2.18 Practice - Common Tools for Forensics</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.19 Common Tools for Software Assurance">10.2.19 Common Tools for Software Assurance</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.20 Practice - Common Tools for Software Assurance">10.2.20 Practice - Common Tools for Software Assurance</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.21 Wireless Tools">10.2.21 Wireless Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.22 Practice - Wireless Tools">10.2.22 Practice - Wireless Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.23 Steganography Tools">10.2.23 Steganography Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.24 Practice - Steganography Tools">10.2.24 Practice - Steganography Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.25 Cloud Tools">10.2.25 Cloud Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.2.26 Practice - Cloud Tools">10.2.26 Practice - Cloud Tools</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="10.3. Summary">10.3. Summary</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.3.1 What Did I Learn in this Module?">10.3.1 What Did I Learn in this Module?</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.3.2 Reflection Questions">10.3.2 Reflection Questions</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="10.3.3 Quiz -  Tools and Code Analysis">10.3.3 Quiz - Tools and Code Analysis</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 nodeSubSectionActive--EJiXb subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge]()</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Final Capstone Activity</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active">![expand]()</div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height: 50em;"><div class="subModuleContainer--D82xI active--9d6uj viewOnlyMode--D1Vix mediumFont--krlDJ hasBlocks--IGTi0 showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![expand]()</div><div class="subModuleName--NhmoF" title="Final Capstone Activity">Final Capstone Activity</div></div><div class="blocks--d9PMX active--9d6uj"><div class="blockMainContainer--W0NSn showBadge--IiGsa">[<span class="block--V8kRI"><span class="blockProgress--C63gh firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="Objectives">Objectives</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div><div class="blockMainContainer--W0NSn showBadge--IiGsa lastBlock--drSI0">[<span class="block--V8kRI"><span class="blockProgress--C63gh lastBlockProgress--HSlTM firstLevel--se7do">![start]()</span><span class="blockName--uu11F" title="Required Resources">Required Resources</span></span>](https://skillsforall.com/course/ethical-hacker?courseLang=en-US&instance_id=dbe39cae-4a44-46c6-98a0-1599bdc8a637)</div></div></div></div></div><div class="nodeContainer--3DQo1 subSectionToggleView--1cgyr hasSubModules--m5mlS moduleContainer--elYXX viewOnlyMode--zF55B mediumFont--zbzM1 nodeTypeModule--u9MhN"><div class="badge--0cbBZ">![badge](https://skillsforall.com/p/ff9e491c-49be-4734-803e-a79e6e83dab1/badges/badge-images/3d237b16-c5c6-4650-918d-6b7b6dfe6ddd.png)</div><div class="nodeInfoLabel--r+qkW"><div class="nodeName--AZrtx">Ethical Hacker: Course Final Exam</div></div><div class="toggleIconContainer--ajFOh toggleActive--G2SES toggle-icon-container active">![expand]()</div><div class="subSection--AGrEx subSectionActive--MeUuV" style="max-height: 50em;"><div class="subModuleContainer--D82xI viewOnlyMode--D1Vix mediumFont--krlDJ showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![start]()</div><div class="subModuleName--NhmoF" title="Course Final Exam">Course Final Exam</div></div></div><div class="subModuleContainer--D82xI viewOnlyMode--D1Vix mediumFont--krlDJ showBadge--w49Gy"><div class="subModuleBtnContainer--4LvVZ"><div class="subModuleStatus--7NRlt">![start]()</div><div class="subModuleName--NhmoF" title="End of Course Survey">End of Course Survey</div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>## Resources

<div class="tabContentWrapper--ozRIX" id="bkmrk-no-resources-found."><div class="b2c_containerPadding--mLGeD"><div class="row"><div class="col-md-12 col-lg-7 order-lg-1"><div class="dbl-margin-top dbl-margin-bottom" id="bkmrk-no-resources-found.-1"><div><div class="dbl-margin-top text-size-12"><div><div data-gjs-type="wrapper" data-highlightable="1" id="bkmrk-no-resources-found.-2"><div class="" data-gjs-type="default" data-highlightable="1" draggable="true"><div class="dbl-margin-top dbl-margin-bottom" id="bkmrk-no-resources-found.-3"><div class="container-fluid"><div class="dbl-margin-bottom"><div class="clearfix base-margin-bottom"><div class="pull-left">  
</div></div><div class="noDataWrapper--YyHW+ text-center">![No data found]()<div class="text-size-18 text-weight-700 base-margin-top">No Resources Found.</div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>