# Welcome to the Ethical Hacker Course

<div class="article__header" id="bkmrk-i-started-ripping-th"><div class="article__header-inner"><div class="article__title">  
i started ripping this course on August 30th of 2023 </div><div class="article__title">so some things may be a bit different if you take the course</div><div class="article__title">[https://skillsforall.com/course/ethical-hacker?courseLang=en-US](https://skillsforall.com/course/ethical-hacker?courseLang=en-US)  
---

<div aria-hidden="true" class="article__title-inner">  
The Fictional Companies in the Ethical Hacker Course</div></div></div></div>Throughout the content of the course, you follow an engaging gamified narrative and get lots of practice with hands-on labs inspired by real-world scenarios. On this journey, you will be guided by your virtual mentor “Alex” at our fictional offensive security company, **Protego Security Solutions**. Within your role as a junior penetration tester at Protego, you will learn all the penetration testing phases of a client engagement. **Pixel Paradise**, a video game company, is the fictional company that will serve as your client during the course.

Below are informational flyers for each fictional company.

<div class="block__container" id="bkmrk-complete-your-employ"><div class="block 64c2ce4cfcc1c4698ff75ba5    is-complete " data-adapt-id="64c2ce4cfcc1c4698ff75ba5"><div class="block__inner"><div class="component__container"><div class="component text 64c2ce5d781bce6b10adcbd4 background-color-gray remove-padding-bottom   is-full is-complete " data-adapt-id="64c2ce5d781bce6b10adcbd4"><div class="component__inner text__inner"><div class="component__header text__header" id="bkmrk-"><div class="component__header-inner text__header-inner"><div class="component__body text__body"><div class="component__body-inner text__body-inner">  
</div></div></div></div></div></div></div></div></div><div class="block 64c287e92b726d68e602fddd background-color-white remove-padding-top remove-padding-bottom   is-complete " data-adapt-id="64c287e92b726d68e602fddd"><div class="block__inner"><div class="component__container"><div class="component webcomponentmedia 64c2cbe9fcc1c4698ff75ba3 is-undefined is-complete zoom-img-enabled" data-adapt-id="64c2cbe9fcc1c4698ff75ba3"><div aria-label="" classname="component__inner webcomponentmedia__inner" role="region"><div class="component__header webcomponentmedia__header"><div class="component__header-inner webcomponentmedia__header-inner"><div class="component__title webcomponentmedia__title"><div class="js-heading is-complete"><div aria-level="4" class="js-heading-inner" id="bkmrk-complete-your-employ-1" role="heading"><span class="aria-label"> Complete Your Employer: Protego Security Solutions </span></div></div><div aria-hidden="true" class="component__title-inner webcomponentmedia__title-inner">Your Employer: Protego Security Solutions</div><div aria-hidden="true" class="component__title-inner webcomponentmedia__title-inner">(id copy and paste with formating but this is just so hard with all the details so ill just do a picture  
</div></div></div></div></div></div></div></div></div></div>[![image.png](https://library.naruzkurai.com/uploads/images/gallery/2023-08/scaled-1680-/image.png)](https://library.naruzkurai.com/uploads/images/gallery/2023-08/image.png)

<div class="article__header" id="bkmrk-what-will-i-learn-in"><div class="article__header-inner"><div class="article__title"><div aria-hidden="true" class="article__title-inner">What Will I Learn in This Course?</div></div></div></div>The digital landscape is evolving at an unprecedented rate and cyber threats lurk around every corner. Cybersecurity resilience in the modern world cannot be just an add on - it's a necessity.

Offensive security professionals like ethical hackers and penetration testers can help proactively discover unknown threats and address them before the cybercriminals do.

This course is designed to prepare you with an Ethical Hacker skillset and give you a solid understanding of offensive security. You will become proficient in the art of scoping, executing, and reporting on vulnerability assessments, while recommending mitigation strategies.

After completing this course, continue your cybersecurity career in offensive security (red team) as an ethical hacker or penetration tester. Or use this course to strengthen your defensive security (blue team) knowledge. By understanding the mindset of threat actors, you will be able to more effectively implement security controls and monitor, analyze, and respond to current security threats.

<table id="bkmrk-module-title-module-" style="width: 100%;"><tbody><tr class="table-row nth-child-0 "><th class="table-data table-heading nth-child-0 " colspan="1" rowspan="1" style="width: 41.6521%;">**Module Title**

</th><th class="table-data table-heading nth-child-1 " colspan="1" rowspan="1" style="width: 58.3376%;">**Module Objective**

</th></tr><tr class="table-row nth-child-1 "><td class="table-data nth-child-0 " colspan="1" rowspan="1" style="width: 41.6521%;">Introduction to Ethical Hacking and Penetration Testing

</td><td class="table-data nth-child-1 " colspan="1" rowspan="1" style="width: 58.3376%;">Explain the importance of methodological ethical hacking and penetration testing.

</td></tr><tr class="table-row nth-child-2 "><td class="table-data nth-child-0 " colspan="1" rowspan="1" style="width: 41.6521%;">Planning and Scoping a Penetration Testing Assessment

</td><td class="table-data nth-child-1 " colspan="1" rowspan="1" style="width: 58.3376%;">Create penetration testing preliminary documents.

</td></tr><tr class="table-row nth-child-3 "><td class="table-data nth-child-0 " colspan="1" rowspan="1" style="width: 41.6521%;">Information Gathering and Vulnerability Scanning

</td><td class="table-data nth-child-1 " colspan="1" rowspan="1" style="width: 58.3376%;">Perform information gathering and vulnerability scanning activities.

</td></tr><tr class="table-row nth-child-4 "><td class="table-data nth-child-0 " colspan="1" rowspan="1" style="width: 41.6521%;">Social Engineering Attacks

</td><td class="table-data nth-child-1 " colspan="1" rowspan="1" style="width: 58.3376%;">Explain how social engineering attacks succeed.

</td></tr><tr class="table-row nth-child-5 "><td class="table-data nth-child-0 " colspan="1" rowspan="1" style="width: 41.6521%;">Exploiting Wired and Wireless Networks

</td><td class="table-data nth-child-1 " colspan="1" rowspan="1" style="width: 58.3376%;">Explain how to exploit wired and wireless network vulnerabilities.

</td></tr><tr class="table-row nth-child-6 "><td class="table-data nth-child-0 " colspan="1" rowspan="1" style="width: 41.6521%;">Exploiting Application-Based Vulnerabilities

</td><td class="table-data nth-child-1 " colspan="1" rowspan="1" style="width: 58.3376%;">Explain how to exploit application-based vulnerabilities.

</td></tr><tr class="table-row nth-child-7 "><td class="table-data nth-child-0 " colspan="1" rowspan="1" style="width: 41.6521%;">Cloud, Mobile, and IoT Security

</td><td class="table-data nth-child-1 " colspan="1" rowspan="1" style="width: 58.3376%;">Explain how to exploit cloud, mobile, and IoT security vulnerabilities.

</td></tr><tr class="table-row nth-child-8 "><td class="table-data nth-child-0 " colspan="1" rowspan="1" style="width: 41.6521%;">Performing Post-Exploitation Techniques

</td><td class="table-data nth-child-1 " colspan="1" rowspan="1" style="width: 58.3376%;">Explain how to perform post-exploitation activities.

</td></tr><tr class="table-row nth-child-9 "><td class="table-data nth-child-0 " colspan="1" rowspan="1" style="width: 41.6521%;">Reporting and Communication

</td><td class="table-data nth-child-1 " colspan="1" rowspan="1" style="width: 58.3376%;">Create a penetration testing report.

</td></tr><tr class="table-row nth-child-10 "><td class="table-data nth-child-0 " colspan="1" rowspan="1" style="width: 41.6521%;">Tools and Code Analysis

</td><td class="table-data nth-child-1 " colspan="1" rowspan="1" style="width: 58.3376%;">Classify pentesting tools by use case.

</td></tr></tbody></table>

<div class="article__header" id="bkmrk-ethical-hacking-stat"><div class="article__header-inner"><div class="article__title"><div aria-hidden="true" class="article__title-inner">Ethical Hacking Statement</div></div></div></div><div class="block__container" id="bkmrk-this-is-a-multiple-c"><div class="block 64c26ae2e394fc68507fd4e0     " data-adapt-id="64c26ae2e394fc68507fd4e0"><div class="block__inner"><div class="component__container"><div class="component is-question mcq 64c2d48714d1016b75c35481   is-full   can-show-model-answer can-show-feedback can-show-marking" data-adapt-id="64c2d48714d1016b75c35481"><div class="component__inner mcq__inner"><div class="component__header mcq__header"><div class="component__header-inner mcq__header-inner"><div class="aria-label">This is a multiple choice question. Once you have selected an option, select the submit button below</div><div class="component__body mcq__body"><div class="component__body-inner mcq__body-inner"><div class="row"><div class="col-md-12"><div class="text-asset undefined" style="position: relative;">  
</div></div></div></div></div></div></div></div></div></div></div></div></div>In this course, you will explore and apply various tools and techniques within a controlled, "sandboxed" Ethical Hacker Kali Linux virtual machine environment to simulate cyber-attacks and discover, assess, and exploit built-in vulnerabilities. It is crucial to acknowledge that the hands-on labs are meant solely for educational purposes, aiming to equip you with the skills to identify and safeguard against real-world threats. The vulnerabilities and weaknesses demonstrated here must be used responsibly and ethically, exclusively within this designated "sandboxed" environment.

Engaging with these tools, techniques, or resources beyond the provided "sandboxed" virtual environment or outside your authorized scope may lead to violations of local laws and regulations. We strongly emphasize the **importance** of seeking clarification from your administrator or instructor before attempting any experimentation.

It is imperative to comprehend that **unauthorized access to data, computer systems, and networks is illegal** in numerous jurisdictions, **regardless of intentions or motivations**. We emphasize the significance of using your newfound knowledge responsibly and ensuring compliance with all applicable laws and regulations.

**By accepting this "Ethical Hacker Statement," you acknowledge the critical importance of utilizing the skills acquired in this course for ethical and lawful purposes only, and you commit to upholding the principles of responsible cybersecurity practices. Remember, with great power comes great responsibility.**

**Your Acknowledgment**

Do you acknowledge and accept your responsibility, as the user of this course, to be cognizant of and compliant with local laws, regulations, and ethical use?

<div class="block__container" id="bkmrk-yes%2C-i-accept-my-res"><div class="block 64c26ae2e394fc68507fd4e0     " data-adapt-id="64c26ae2e394fc68507fd4e0"><div class="block__inner"><div class="component__container"><div class="component is-question mcq 64c2d48714d1016b75c35481   is-full   can-show-model-answer can-show-feedback can-show-marking" data-adapt-id="64c2d48714d1016b75c35481"><div class="component__inner mcq__inner"><div class="component__header mcq__header" id="bkmrk--2"><div class="component__header-inner mcq__header-inner"><div class="component__body mcq__body"><div class="component__body-inner mcq__body-inner"><div class="row"><div class="col-md-12"><div class="text-asset undefined" id="bkmrk--3" style="position: relative;"></div></div></div></div></div></div></div><div class="component__widget mcq__widget" role="radiogroup"><div class="mcq__item js-mcq-item item-0"><div class="mcq__item-state"><div class="mcq__item-icon mcq__item-answer-icon is-radio"><div class="icon">  
</div></div></div><div class="mcq__item-text"><div class="mcq__item-text-inner">Yes, I accept my responsibility as specified in the **Ethical Hacking Statement**.</div></div></div><div class="mcq__item js-mcq-item item-1"><div class="mcq__item-state"><div class="mcq__item-icon mcq__item-answer-icon is-radio"><div class="icon">  
</div></div></div><div class="mcq__item-text"><div class="mcq__item-text-inner">No, I do not accept my responsibility as specified in the **Ethical Hacking Statement**.</div></div></div></div></div></div></div></div></div></div>