Offensive Security Ethical Hacking

This course delves into the minds of criminal hackers to give students a sense of how black hat hackers think, what their intentions are, and what they do to implement their intentions. Students will learn how to execute and defend against social engineering attacks, network attacks, application attacks, and cryptographic attacks.

Hands-on labs provide students with methods, tools, knowledge, and skills to discover and exploit system vulnerabilities. This course constitutes additional preparation for the CompTIA Security+, C|EH, and CySA+ certification exams.

Category:

Description

Prerequisites:
-Background in security or information systems
-Knowledge of TCP/IP and experience with networking
-Knowledge of operating systems (Linux and Windows)

Module-1:
Introduction to Ethical Hacking
-Fundamentals
-Ethics
-Malware
-Cyber Attack Cycle

Module-2:
Network Scanning
-Network Scanning Definition
-Nmap Overview
-Nmap Scanning Types
-Additional Tools

Module-3:
MITM Attacks
-MITM
-ARP Poisoning
-DNS Poisoning
-Port Stealing
-SSL Stripping

Module-4:
Brute-Force
-Fundamentals
-Offline Password Cracking
-Online Password Attacks

Module-5:
Social Engineering
-Introduction
-Social Engineering Toolkit
-SE Additional Tools

Module-6:
Infrastructure Attacks
-Metasploit
-Reverse Shell
-Lateral Movement

Module-7:
Windows Privilege Escalation
-Windows Privileges
-Windows Local PE
-Post Exploitation

Module-8:
Linux Privilege Escalation
-Linux Local PE
-Linux Remote PE

Module-9:
Web Application Security Fundamentals
-Understanding HTTP
-Burp Suite

Module-10:
XSS & File Inclusion
-Client-Side Web languages
-Cross-Site Scripting
-Session Hijacking
-XSS Mitigations
-Local File Inclusion

Module-11:
SQL Injection
-Introduction to Databases
-SQLi

Module-12:
Vulnerability Scanners & Reporting
-Automated Scanning
-Vulnerability Scanners
-PT Report Subjects
-Regulations

Module-13
Final Project – Final Project Scenarios

Datasheets

  • Datasheet 1

Video



Categories


Partners: HackerU


Available Training: HackerU Defensive Security