Offensive Security Ethical Hacking
This course delves into the minds of criminal hackers to give students a sense of how black hat hackers think, what their intentions are, and what they do to implement their intentions. Students will learn how to execute and defend against social engineering attacks, network attacks, application attacks, and cryptographic attacks.
Hands-on labs provide students with methods, tools, knowledge, and skills to discover and exploit system vulnerabilities. This course constitutes additional preparation for the CompTIA Security+, C|EH, and CySA+ certification exams.
Description
Prerequisites:
-Background in security or information systems
-Knowledge of TCP/IP and experience with networking
-Knowledge of operating systems (Linux and Windows)
Module-1:
Introduction to Ethical Hacking
-Fundamentals
-Ethics
-Malware
-Cyber Attack Cycle
Module-2:
Network Scanning
-Network Scanning Definition
-Nmap Overview
-Nmap Scanning Types
-Additional Tools
Module-3:
MITM Attacks
-MITM
-ARP Poisoning
-DNS Poisoning
-Port Stealing
-SSL Stripping
Module-4:
Brute-Force
-Fundamentals
-Offline Password Cracking
-Online Password Attacks
Module-5:
Social Engineering
-Introduction
-Social Engineering Toolkit
-SE Additional Tools
Module-6:
Infrastructure Attacks
-Metasploit
-Reverse Shell
-Lateral Movement
Module-7:
Windows Privilege Escalation
-Windows Privileges
-Windows Local PE
-Post Exploitation
Module-8:
Linux Privilege Escalation
-Linux Local PE
-Linux Remote PE
Module-9:
Web Application Security Fundamentals
-Understanding HTTP
-Burp Suite
Module-10:
XSS & File Inclusion
-Client-Side Web languages
-Cross-Site Scripting
-Session Hijacking
-XSS Mitigations
-Local File Inclusion
Module-11:
SQL Injection
-Introduction to Databases
-SQLi
Module-12:
Vulnerability Scanners & Reporting
-Automated Scanning
-Vulnerability Scanners
-PT Report Subjects
-Regulations
Module-13
Final Project – Final Project Scenarios