Your cart is currently empty!
Ethical Hacking & Penetration Testing
Written by
in
Ethical Hacking & Penetration Testing
Course Overview
Learn how to ethically identify, exploit, and report vulnerabilities in systems and networks. This course covers all phases of penetration testing:
- Reconnaissance: Gathering information about targets
- Scanning: Identifying open ports and services
- Exploitation: Gaining access and escalating privileges
- Post-Exploitation: Maintaining access and evidence collection
Course Lessons
1. Reconnaissance Techniques
IncompleteDiscover how to gather open-source intelligence (OSINT), scan for public information, and profile targets.
2. Vulnerability Scanning & Enumeration
LockedKnowledge Checks
Quiz 1: Recon & Scanning
Not AttemptedEvaluate your knowledge of reconnaissance methods and vulnerability scanning tools.
Course Resources
Penetration Testing Toolkit
Collection of recommended tools for each phase of a pen-test
Pentest Checklist
Checklist for common steps and best practices during penetration tests
Legal & Ethical Guidelines
Documentation on rules of engagement and ethical hacking principles
Submit Your Pen-Test Report
Upload a sample penetration testing report or vulnerability findings.
Final Exam
Ethical Hacking & Penetration Testing Exam
Not AttemptedDemonstrate your ability to plan, execute, and report on a penetration test. You must score 85% or higher to pass.