MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Learn The Basics of Ethical Hacking in Easy Steps

Course Summary

You don’t have to be perfect to be a hacker. Or the smartest person in the room. Or a type-A personality.


  • +

    Course Syllabus

    • Solid Introduction to Ethical Hacking and Penetration Testing
      • About the course
      • Hacking vs Ethical Hacking
      • Who is a Hacker ?
      • Types of Hackers
      • Hacktivism
      • Computer Crimes
      • Important Terms 1
      • Important Terms 2
      • Why Penetration Testing ?
      • Penetration Testing Types
    • Real World Information Intelligence Techniques
      • Introduction to Information Intelligence Techniques
      • organizing information during a penetration test
      • how to locally copying company websites
      • newsgroups and list-servers
      • online job listing
      • the power of social media websites
      • harvesting a company emails
      • how to generate a targeted wordlist for password cracking
      • information intelligence with Maltego
      • Google Search Techniques for penetration testers
      • other search engines for penetration testers
      • Enumerating Internal Network From Outside
      • gather information using WhatWeb, HttpRecon and SSL SCAN
      • Whois Lookups, finding other Web Sites Hosted on a Web Server
      • IP Address Geolocation
      • finding subdomains, extracting exif data and finding hidden web dirs
      • ShodanHQ for fun and profit
      • Web Application Firewall Detection, HTTP and DNS load balancer detection
      • DNS Enumerating for penetration testers
      • Mail Server Enumeration for penetration testers
      • Intel Gathering Methodology for penetration testers
    • Scanning and vulnerability Assessment
      • packet Crafting and Manipulating with Scapy
      • port scanning with scapy
      • Network Enumeration and Mapping Techniques
      • Network scanning techniques
      • Vulnerability Identification and Assessment techniques
      • Practical Evasion and avoidance Techniques
    • Network Attacking Techniques
      • Password cracking, MITM, Sniffing SSL and RDP Attacks
    • Windows and Linux Attacking Techniques
      • Windows Security Overview for Penetration Testers
      • Linux Security Overview for Penetration Testers
      • Attacking and Hacking Windows
      • Attacking and Hacking Linux
    • Windows and Linux Post-Exploitation Techniques
      • Windows post exploitation techniques
      • Linux post exploitation techniques
      • Data mining techniques
    • Web Exploitation Techniques
      • Web Application Primer
      • Web Application Scanning and Mapping
      • Exploiting SQL Injection to Full System Access (MYSQL)
      • Exploiting SQL Injection to Full System Access (MSSQL)
      • Exploiting Blind SQL Injection to Full System Access (MYSQL)
      • Exploiting Blind SQL Injection to Full System Access (MSSQL)
      • Exploiting RFI, Local File include, File Uploads and RCE
      • Exploiting XSS ( Reflected and Stored ) and CSRF to Full System Access
    • Windows Exploit Development
      • Using Immunity Debugger and Metasploit to develop a windows exploit
    • The end but it is not the end :)
      • The end


Course Fee:
USD 499

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top