Offensive Security Ethical Hacking

CB109


5 Days

Download Full Syllabus Request a Quote
All Our Courses Now Also LIVE

Course Outline

This course delves into the minds of criminal hackers to give students a sense of how black hat hackers think, what their intentions are, and what they do to implement their intentions. Students will learn how to execute and defend against social engineering attacks, network attacks, application attacks, and cryptographic attacks.

Hands-on labs provide students with methods, tools, knowledge, and skills to discover and exploit system vulnerabilities. This course constitutes additional preparation for the CompTIA Security+, C|EH, and CySA+ certification exams.

Upcoming Meetings

Modules

Introsuction to Ethical Hacking
  • Fundamentals
  • Ethics
  • Malware
  • Cyber Attack Cycle
Network Scanning
  • Network Scanning Definition
  • Nmap Overview
  • Nmap Scanning Types
  • Additional Tools
MITM Attacks
  • MITM
  • ARP Poisoning
  • DNS Poisoning
  • Port Stealing
  • SSL Stripping
Brute-Force
  • Fundamentals
  • Offline Password Cracking
  • Online Password Attacks
Social Engineering
  • Introduction
  • Social Engineering Toolkit
  • SE Additional Tools
Infrastructure Attacks
  • Metasploit
  • Reverse Shell
  • Lateral Movement
Windows Privilege Escalation
  • Windows Privileges
  • Windows Local PE
  • Post Exploitation
Linux Privilege Escalation
  • Linux Local PE
  • Linux Remote PE
Web Application Security Fundamentals
  • Understanding HTTP
  • Burp Suite
XSS & File Inclusion
  • Client-Side Web languages
  • Cross-Site Scripting
  • Session Hijacking
  • XSS Mitigations
  • Local File Inclusion
SQL Injection
  • Introduction to Databases
  • SQLi
Vulnerability Scanners & Reporting
  • Automated Scanning
  • Vulnerability Scanners
  • PT Report Subjects
  • Regulations
Final Project
  • Final Project Scenarios

Prerequisites

  • Background in security or information systems
  • Knowledge of TCP/IP and experience with networking
  • Knowledge of operating systems (Linux and Windows)

Upcoming Meetings

Execute and defend against social engineering attacks, network attacks, application attacks, and cryptographic attacks”
Download Full Syllabus

Target Audience