Ethical Hacking
Course Description:
This course helps the student master the skill of an Ethical Hacker and Penetration Tester. Ethical hacks and penetration testers are a skilled professionals who understands and know how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s).
This course helps the student prepare for the CompTIA Pentest+ (PT0-001) exam or the EC-Council Certified Ethical Hacker (312-50) exam.
Course Objectives: Upon successful completion of this course, the student will be able to:
Prepare
- Given a scenario, perform reconnaissance
-
- Perform reconnaissance with operating system tools
- Perform reconnaissance with hacking tools
Given a scenario, perform scanning
-
- Scan for network devices
- Discover wireless devices
- Scan for IoT devices
- Detect operating systems and applications
- Identify open ports
- Scan for vulnerabilities
Given a scenario, perform enumeration
-
- Enumerate network resources
- Enumerate device information
Gain Access
- Given a scenario, obtain login credentials
-
- Obtain credentials using tools
- Use Social Engineering
Given a scenario, gain administrative access and escalate privileges
-
- Gain access through a backdoor
- Escalate privileges
- Hijack a web session
- Crack Wi-Fi devices
Attack
- Given a scenario, perform passive online attacks
-
- Examine hidden web form fields
- Conduct a man-in-the-middle attack
- Perform passive sniffing
Given a scenario, perform active online attacks
-
- Perform an SQL injection
- Execute a DoS or DDoS attack
- Perform active sniffing
Given a scenario, perform infrastructure attacks
-
- Attack a web server
- Access wireless networks
- Evade firewalls, IDSs, and honeypots
Cover Up
- Given a scenario, cover up access
-
- Disable auditing
- Clear logs
- Remove or hide files and folders
- Change MAC address
Defend a System
- Given a scenario, defend systems and devices
-
- Hide a web server banner broadcast
- Discover rogue hosts and configure protection
- Secure mobile devices
- Configure account policies and account control
- Ensure file integrity
- Implement drive encryption
- Use malware protection
Given a scenario, implement defensive systems
-
- Implement an Intrusion Detection System (IDS)
- Create a honeypot
- Prevent DNS zone transfer
- Disable unnecessary services
- Implement physical security countermeasures
- Configure a perimeter firewall