Ethical Hacker

Learn the art of offensive security to uncover cyber threats and vulnerabilities before the cybercriminals do.

Le programme en détail

The digital landscape is evolving at an unprecedented rate and cyber threats lurk around every corner. Cybersecurity resilience in the modern world cannot be just an add on - it's a necessity. Offensive security professionals like ethical hackers and penetration testers can help proactively discover unknown threats and address them before the cybercriminals do.

This course is designed to prepare you with an Ethical Hacker skillset and give you a solid understanding of offensive security. You will become proficient in the art of scoping, executing, and reporting on vulnerability assessments, while recommending mitigation strategies. Follow an engaging gamified narrative throughout the course and get lots of practice with hands-on labs inspired by real-world scenarios.

After completing this course, continue your cybersecurity career in offensive security as an ethical hacker or penetration tester. Or use this course to strengthen your defensive security knowledge. By understanding the mindset of threat actors, you will be able to more effectively implement security controls and monitor, analyze, and respond to current security threats.

programme
  • Course Introduction
  • Module 1: Introduction to Ethical Hacking and Penetration Testing
  • Module 2: Planning and Scoping a Penetration Testing Assessment
  • Module 3: Information Gathering and Vulnerability Scanning
  • Module 4: Social Engineering Attacks
  • Module 5: Exploiting Wired and Wireless Networks
  • Module 6: Exploiting Application-Based Vulnerabilities
  • Module 7: Cloud, Mobile, and IoT Security
  • Module 8: Performing Post-Exploitation Techniques
  • Module 9: Reporting and Communication
  • Module 10: Tools and Code Analysis
  • Final Capstone Activity
  • Ethical Hacker Course Final Exam

Les compétences que vous allez acquérir
IoT Security, Penetration Testing, Ethical Hacking, Exploiting Applications, Social Engineering, Vulnerability Scanning, Reporting, Vulnerability Assessment, Exploiting Networks, Pentesting Tools

organisation