Step into the mindset of an ethical hacker. Uncover vulnerabilities, audit systems, and run simulated attacks—all while learning to strengthen organizational security and create effective cybersecurity reports.
Overview
Syllabus
- Welcome to Ethical Hacking
- Meet the instructor, get an overview of the course and start learning about why Ethical Hacking is such an exciting field. Let's get started!
- Vulnerability Management
- Perform a vulnerability scan using automated tools, manage prioritization and response, and score the vulnerabilities you uncover
- System Auditing
- Use test scopes to understand the context and objectives of an audit, gather information about our target, research vulnerabilities, execute exploits, and write effective reports on our findings
- Application Auditing
- Use OWASP WTG methodologies, create HTTP requests to access target systems and employ semi-automated and fully-automated tools in applications audits
- Social Engineering
- Explore the tactics malicious hackers use to manipulate people to take specific actions, conduct a phishing simulation, create and deploy malware and design an effective landing page
- OSINT
- Employ open-source intelligence techniques to uncover information leakage. Use Exploratory Link Analysis techniques to mine data, establish links between the data and analyze the links
- Audit ExampleCorp
- Use the skills you have developed in this course to manage a full-fledged security audit of a fictitious company called ExampleCorp
Taught by
Sagar Bansal