Offensive Security Ethical Hacking

CB109


5 Days

Download Full Syllabus Request a Quote
All Our Courses Now Also LIVE

Course Outline

This course delves into the minds of criminal hackers to give students a sense of how black hat hackers think, what their intentions are, and what they do to implement their intentions. Students will learn how to execute and defend against social engineering attacks, network attacks, application attacks, and cryptographic attacks.

Hands-on labs provide students with methods, tools, knowledge, and skills to discover and exploit system vulnerabilities. This course constitutes additional preparation for the CompTIA Security+, C|EH, and CySA+ certification exams.

Upcoming
Meetings

There are no upcoming meetings for this course.
Contact us to schedule this course, which will be customized specifically for your organization.
info@hackerupro.com

Modules

Introsuction to Ethical Hacking
  • Fundamentals
  • Ethics
  • Malware
  • Cyber Attack Cycle
Network Scanning
  • Network Scanning Definition
  • Nmap Overview
  • Nmap Scanning Types
  • Additional Tools
MITM Attacks
  • MITM
  • ARP Poisoning
  • DNS Poisoning
  • Port Stealing
  • SSL Stripping
Brute-Force
  • Fundamentals
  • Offline Password Cracking
  • Online Password Attacks
Social Engineering
  • Introduction
  • Social Engineering Toolkit
  • SE Additional Tools
Infrastructure Attacks
  • Metasploit
  • Reverse Shell
  • Lateral Movement
Windows Privilege Escalation
  • Windows Privileges
  • Windows Local PE
  • Post Exploitation
Linux Privilege Escalation
  • Linux Local PE
  • Linux Remote PE
Web Application Security Fundamentals
  • Understanding HTTP
  • Burp Suite
XSS & File Inclusion
  • Client-Side Web languages
  • Cross-Site Scripting
  • Session Hijacking
  • XSS Mitigations
  • Local File Inclusion
SQL Injection
  • Introduction to Databases
  • SQLi
Vulnerability Scanners & Reporting
  • Automated Scanning
  • Vulnerability Scanners
  • PT Report Subjects
  • Regulations
Final Project
  • Final Project Scenarios

Prerequisites

  • Background in security or information systems
  • Knowledge of TCP/IP and experience with networking
  • Knowledge of operating systems (Linux and Windows)

Upcoming Meetings

There are no upcoming meetings for this course.
Contact us to schedule this course customized for your organization in a group format.
info@hackerupro.com
Execute and defend against social engineering attacks, network attacks, application attacks, and cryptographic attacks”
Download Full Syllabus

Target Audience

Contact Us

    • Israel
    • Poland
    • USA
    • India
    Skip to content