Cybersecurity
Samer
Penetration Testing and Ethical Hacking
Learn the principles and techniques of ethical hacking and penetration testing
Samer Aoudi
Available Feb 2023 English 0

Register »

Course Description

This course covers the principles and techniques of ethical hacking and penetration testing, including topics such as network and system scanning, vulnerability assessment, and exploitation techniques. Students will learn how to identify and exploit vulnerabilities in systems and networks, and how to use these skills ethically to help organizations secure their systems.



Learning Outcomes
Upon completion of Introduction to Information Security, students will be able to:
  1. Demonstrate an understanding of the concepts and methodologies used in penetration testing and ethical hacking
  2. Identify vulnerabilities and weaknesses in systems and networks
  3. Develop and implement effective countermeasures to prevent breaches
  4. Utilize a variety of tools and techniques to conduct penetration testing and ethical hacking
  5. Communicate the results of penetration testing activities
Prerequisite Knowledge: Network Security, Operating System Security, Cryptography
Requirements: TBA
Duration: 0 hours
Files: Kali Linux, Windows 10 Target, Metasploitable 2
Course Access
Digital Book
Read
Full access to digital learning materials              
YouTube Channel
Watch
Dedicated YouTube Playlist for web application security
Apply
Apply
Apply your knowledge in a contrlled lab environment    
Course Outline
Target Audience

This course is suitable for students with a background in computer science or cybersecurity who are interested in learning about the principles and techniques of ethical hacking and penetration testing. It may be particularly useful for students who are considering a career in cybersecurity testing or security assessment.

Edition

This is the first edition of the book. Published on January 7, 2023

Course Modules

Module 1 - Introduction to Penetration Testing and Ethical Hacking: This module provides an overview of the field of penetration testing and ethical hacking, including its history, key concepts, and methodologies. This module also covers the ethical and legal issues surrounding ethical hacking.

Module 2 - Reconnaissance and Footprinting: This module covers the process of gathering information about a target system or network. Students will learn about various reconnaissance techniques, such as passive and active reconnaissance.

Module 3 - Scanning and Enumeration: This module covers the process of identifying vulnerabilities and weaknesses in a target system or network. Students will learn about various scanning techniques and tools, such as vulnerability scanners and port scanners.

Module 4 - Exploitation: This module covers the process of gaining unauthorized access to a target system or network. Students will learn about various exploitation techniques and tools, such as Metasploit and social engineering.

Module 5 - Post-Exploitation and Maintaining Access: This module covers the process of maintaining and escalating access after gaining unauthorized access. Students will learn about various post-exploitation techniques and tools, such as rootkits and backdoors.

Module 6 - Countermeasures and Remediation: This module covers the process of developing and implementing effective countermeasures to prevent unauthorized access, and how to remediation of security vulnerabilities.

Module 7 - Reporting and Communication: This module covers the process of communicating and documenting the results of penetration testing and ethical hacking activities. Students will learn how to create effective penetration testing reports and deliver them to stakeholders.

Legal

Some of the product names and company names used in this course have been used for identification purposes only and may be trademarks or registered trademarks of their respective organizations. The software tools and applications in this course are for instructional purposes only. They have been tested with care, but are not guaranteed for any particular intent beyond educational purposes. The author does not offer any warranties or representations, nor does he accept any liabilities with respect to the programs.
© 2022-2023 Samer Aoudi

#cybersecurity #etextbook #websecurity #pentesting #onlinelessons
Ads By Google
               
© Samer Aoudi 2005-2024

Penetration Testing and Ethical Hacking