Ethical Hacking & Penetration Testing

Ethical Hacking & Penetration Testing

Intermediate to Advanced Estimated 12–16 hours
0% Complete

Course Overview

Learn how to ethically identify, exploit, and report vulnerabilities in systems and networks. This course covers all phases of penetration testing:

  • Reconnaissance: Gathering information about targets
  • Scanning: Identifying open ports and services
  • Exploitation: Gaining access and escalating privileges
  • Post-Exploitation: Maintaining access and evidence collection

Course Lessons

1. Reconnaissance Techniques

Incomplete

Discover how to gather open-source intelligence (OSINT), scan for public information, and profile targets.

2. Vulnerability Scanning & Enumeration

Locked

Knowledge Checks

Quiz 1: Recon & Scanning

Not Attempted

Evaluate your knowledge of reconnaissance methods and vulnerability scanning tools.

10 Questions 80% Passing Score

Course Resources

Penetration Testing Toolkit

Collection of recommended tools for each phase of a pen-test

Pentest Checklist

Checklist for common steps and best practices during penetration tests

Legal & Ethical Guidelines

Documentation on rules of engagement and ethical hacking principles

Submit Your Pen-Test Report

Upload a sample penetration testing report or vulnerability findings.

No file chosen

Final Exam

Ethical Hacking & Penetration Testing Exam

Not Attempted

Demonstrate your ability to plan, execute, and report on a penetration test. You must score 85% or higher to pass.

50 Questions 90 Minute Limit 85% Passing Score

Please log in to view this outline.