overview
i started ripping this course on August 30th of 2023
so some things may be a bit different if you take the course
arn the art of offensive security to uncover cyber threats and vulnerabilities before the cybercriminals do.
Aug 27, 2023 - Aug 30, 2024
English
Victor Gevers
ammount of time required to complete: 70 Hours
Intermediate
Number of labs: 34 Labs
Self-Paced
Instructor
-
Victor Gevers
The digital landscape is evolving at an unprecedented rate and cyber threats lurk around every corner. Cybersecurity resilience in the modern world cannot be just an add on - it's a necessity. Offensive security professionals like ethical hackers and penetration testers can help proactively discover unknown threats and address them before the cybercriminals do.
This course is designed to prepare you with an Ethical Hacker skillset and give you a solid understanding of offensive security. You will become proficient in the art of scoping, executing, and reporting on vulnerability assessments, while recommending mitigation strategies. Follow an engaging gamified narrative throughout the course and get lots of practice with hands-on labs inspired by real-world scenarios.
After completing this course, continue your cybersecurity career in offensive security as an ethical hacker or penetration tester. Or use this course to strengthen your defensive security knowledge. By understanding the mindset of threat actors, you will be able to more effectively implement security controls and monitor, analyze, and respond to current security threats.
Prerequisites:
Junior Cybersecurity Analyst Career Path, or equivalent entry-level cybersecurity knowledge
Basic programming knowledge
what you will learn.
Course Introduction
Module 1: Introduction to Ethical Hacking and Penetration Testing
1.0. Introduction
1.1. Understanding Ethical Hacking and Penetration Testing
1.2. Exploring Penetration Testing Methodologies
1.3. Building Your Own Lab
Module 2: Planning and Scoping a Penetration Testing Assessment
2.0. Introduction
2.1. Comparing and Contrasting Governance, Risk, and Compliance Concepts
2.2. Explaining the Importance of Scoping and Organizational or Customer Requirements
2.3. Demonstrating an Ethical Hacking Mindset by Maintaining Professionalism and Integrity
Module 3: Information Gathering and Vulnerability Scanning
3.0. Introduction
3.1. Performing Passive Reconnaissance
3.2. Performing Active Reconnaissance
3.3. Understanding the Art of Performing Vulnerability Scans
3.4. Understanding How to Analyze Vulnerability Scan Results
Module 4: Social Engineering Attacks
4.0. Introduction
4.1. Pretexting for an Approach and Impersonation
4.2. Social Engineering Attacks
4.3. Physical Attacks
4.4. Social Engineering Tools
4.5. Methods of Influence
Module 5: Exploiting Wired and Wireless Networks
5.0. Introduction
5.1. Exploiting Network-Based Vulnerabilities
5.2. Exploiting Wireless Vulnerabilities
Module 6: Exploiting Application-Based Vulnerabilities
6.0. Introduction
6.1. Overview of Web Application-Based Attacks for Security Professionals and the OWASP Top 10
6.2. How to Build Your Own Web Application Lab
6.3. Understanding Business Logic Flaws
6.4. Understanding Injection-Based Vulnerabilities
6.5. Exploiting Authentication-Based Vulnerabilities
6.6. Exploiting Authorization-Based Vulnerabilities
6.7. Understanding Cross-Site Scripting (XSS) Vulnerabilities
6.8. Understanding Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery Attacks
6.9. Understanding Clickjacking
6.10. Exploiting Security Misconfigurations
6.11. Exploiting File Inclusion Vulnerabilities
6.12. Exploiting Insecure Code Practices
Module 7: Cloud, Mobile, and IoT Security
7.0. Introduction
7.1. Researching Attack Vectors and Performing Attacks on Cloud Technologies
7.2. Explaining Common Attacks and Vulnerabilities Against Specialized Systems
Module 8: Performing Post-Exploitation Techniques
8.0. Introduction
8.1. Creating a Foothold and Maintaining Persistence After Compromising a System
8.2. Understanding How to Perform Lateral Movement, Detection Avoidance, and Enumeration
Module 9: Reporting and Communication
9.0. Introduction
9.1. Comparing and Contrasting Important Components of Written Reports
9.2. Analyzing the Findings and Recommending the Appropriate Remediation Within a Report
9.3. Explaining the Importance of Communication During the Penetration Testing Process
9.4. Explaining Post-Report Delivery Activities
Module 10: Tools and Code Analysis
10.0. Introduction
10.1. Understanding the Basic Concepts of Scripting and Software Development
10.2. Understanding the Different Use Cases of Penetration Testing Tools and Analyzing Exploit Code
Final Capstone Activity
Final Capstone Activity
Ethical Hacker: Course Final Exam
Course Final Exam
End of Course Survey
Resources
No Resources Found.