Ethical Hacking for Beginners
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
Hack your way to a secure and threat-free environment using best-in-class tools and techniques.This video course provides a good starting point from which to learn ethical hacking and identify threats and vulnerabilities to secure your IT environment.We'll begin by introducing you to the best tools around; these are essential to get you started with penetration testing. Next, we'll introduce you to a basic hacking technique: reconnaissance. You'll get hands-on experience working with Metasploit and testing the effectiveness of different defenses. Next, you'll learn about sniffing and how effective the Man-in-the-Middle attack can be. We'll take you through a coffee shop scenario to further your understanding. You'll get the hang of bypassing different defenses, then learn how hackers use networks to gain access to different systems.About the authorGary Dewey is an IT consultant specializing in security. A graduate of SUNY Broome's computer security and forensics degree program in New York, he has attended numerous B-Sides conferences and spoken at B-Sides in Rochester, New York. Gary participated in the 2015 US Cyber Challenge held at Virginia Tech. He is an active member of the Triple Cities Makerspace, a non-profit organization dedicated to community collaboration and learning. He enjoys hiking and cats.
Facilities
Location
Start date
Start date
About this course
Stage attacks to your own advantage
Work with the Metasploit toolkit to test the effectiveness of defenses
Incorporate sniffing with the Man-in-the-Middle attack
Bypass modern security defenses to understand the ins and outs of security
Understand how networks are exploited by attackers
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
- Operating System
- TCP
- Systems
- Printing
- Operating Systems
- Hacking
- Switches
- Testing
- Options
Course programme
- Get a grasp on the definitions of the hacking terms used in this course
- Understand their significance
- Know the phases of ethical hacking
- Check out the operating system used in the course
- Glance through some of the tools we have used in the course
- Get a grasp on the definitions of the hacking terms used in this course
- Understand their significance
- Know the phases of ethical hacking
- Check out the operating system used in the course
- Glance through some of the tools we have used in the course
- Get a grasp on the definitions of the hacking terms used in this course
- Understand their significance
- Know the phases of ethical hacking
- Get a grasp on the definitions of the hacking terms used in this course
- Understand their significance
- Know the phases of ethical hacking
- Get a grasp on the definitions of the hacking terms used in this course
- Understand their significance
- Know the phases of ethical hacking
- Get a grasp on the definitions of the hacking terms used in this course
- Understand their significance
- Know the phases of ethical hacking
- Get a grasp on the definitions of the hacking terms used in this course
- Understand their significance
- Know the phases of ethical hacking
- Get a grasp on the definitions of the hacking terms used in this course
- Understand their significance
- Know the phases of ethical hacking
- Check out the operating system used in the course
- Glance through some of the tools we have used in the course
- Check out the operating system used in the course
- Glance through some of the tools we have used in the course
- Check out the operating system used in the course
- Glance through some of the tools we have used in the course
- Check out the operating system used in the course
- Glance through some of the tools we have used in the course
- Check out the operating system used in the course
- Glance through some of the tools we have used in the course
- Check out the operating system used in the course
- Glance through some of the tools we have used in the course
- Understand the importance of the Reconnaissance phase in hacking
- Know more about Passive and Active foot printing
- Take a deeper look at Vulnerability Research
- Understand the 3-way TCP handshake
- Talk about ports, switches, and options
- Use the commands we learnt in demo scenarios
- Scour through the Shodan website
- Explore the options available on the website
- Create a demo report
- Check out vulnerability scanning with Nikto
- Check out vulnerability scanning with Sparta
- Understand the importance of the Reconnaissance phase in hacking
- Know more about Passive and Active foot printing
- Take a deeper look at Vulnerability Research
- Understand the 3-way TCP handshake
- Talk about ports, switches, and options
- Use the commands we learnt in demo scenarios
- Scour through the Shodan website
- Explore the options available on the website
- Create a demo report
- Check out vulnerability scanning with Nikto
- Check out vulnerability scanning with Sparta
- Understand the importance of the Reconnaissance phase in hacking
- Know more about Passive and Active foot printing
- Take a deeper look at Vulnerability Research
- Understand the importance of the Reconnaissance phase in hacking
- Know more about Passive and Active foot printing
- Take a deeper look at Vulnerability Research
- Understand the importance of the Reconnaissance phase in hacking
- Know more about Passive and Active foot printing
- Take a deeper look at Vulnerability Research
- Understand the importance of the Reconnaissance phase in hacking
- Know more about Passive and Active foot printing
- Take a deeper look at Vulnerability Research
- Understand the importance of the Reconnaissance phase in hacking
- Know more about Passive and Active foot printing
- Take a deeper look at Vulnerability Research
- Understand the importance of the Reconnaissance phase in hacking
- Know more about Passive and Active foot printing
- Take a deeper look at Vulnerability Research
- Understand the 3-way TCP handshake
- Talk about ports, switches, and options
- Use the commands we learnt in demo scenarios
- Understand the 3-way TCP handshake
- Talk about ports, switches, and options
- Use the commands we learnt in demo scenarios
- Understand the 3-way TCP handshake
- Talk about ports, switches, and options
- Use the commands we learnt in demo scenarios
- Understand the 3-way TCP handshake
- Talk about ports, switches, and options
- Use the commands we learnt in demo scenarios
- Understand the 3-way TCP handshake
- Talk about ports, switches, and options
- Use the commands we learnt in demo scenarios
- Understand the 3-way TCP handshake
- Talk about ports, switches, and options
- Use the commands we learnt in demo scenarios
- Scour through the Shodan website
- Explore the options available on the website
- Create a demo report
- Scour through the Shodan website
- Explore the options available on the website
- Create a demo report
- Scour through the Shodan website
- Explore the options available on the website
- Create a demo report
- Scour through the Shodan website
- Explore the options available on the website
- Create a demo report
- Scour through the Shodan website
- Explore the options available on the website
- Create a demo report
- Scour through the Shodan website
- Explore the options available on the website
- Create a demo report
- Check out vulnerability scanning with Nikto
- Check out vulnerability scanning with Sparta
- Check out vulnerability scanning with Nikto
- Check out vulnerability scanning with Sparta
- Check out vulnerability scanning with Nikto
- Check out vulnerability scanning with Sparta
- Check out vulnerability scanning with Nikto
- Check out vulnerability scanning with Sparta
- Check out vulnerability scanning with Nikto
- Check out vulnerability scanning with Sparta
- Check out vulnerability scanning with Nikto
- Check out vulnerability scanning with Sparta
- Know what Metasploit is
- Understand the basic commands used in Metasploit
- Know how to find vulnerabilities in a system
- Launch exploits to penetrate a target
- Understand what armitage is
- Know how to effectively use armitage
Additional information
Ethical Hacking for Beginners
