This site is powered by
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Ethical Hacking and Penetration Testing: Course
Introduction
Objective (4:49)
Statistics
What to Expect
How to Get the Most Out of This Course
Module 1: Ethical Hacking Fundamentals
Lesson 1: What is Ethical Hacking?
Lesson 2: The Ethical Hacking Process
Lesson 3: Legal and Ethical Considerations
Lesson 4: Tools and Techniques in Ethical Hacking
Module 1 Quiz: Ethical Hacking Fundamentals
Module 2: Advanced Ethical Hacking Techniques
Objective
Lesson 1: Web Application Security
Lesson 2: Wireless Network Hacking
Lesson 3: Advanced Exploitation Techniques
Lesson 4: Social Engineering and Phishing Attacks
Lesson 5: Incident Response and Forensics
Module 2 Quiz: Advanced Ethical Hacking Techniques
Module 3: Specialized Ethical Hacking Domains
Objective
Lesson 1: Introduction to Cloud Security
Lesson 2: IoT Security and Ethical Hacking
Lesson 3: Mobile Application Security and Ethical Hacking
Lesson 4: Cryptography and Ethical Hacking
Module 3 Quiz: Specialized Ethical Hacking Domains
Module 4: Network Security and Ethical Hacking
Objective
Lesson 1: Introduction to Network Security
Lesson 2: Network Scanning and Enumeration
Lesson 3: Intrusion Detection and Prevention Systems (IDPS) in Ethical Hacking
Lesson 4: Social Engineering Attacks and Countermeasures in Ethical Hacking
Lesson 5: Ethical Hacking in the Internet of Things (IoT) Landscape
Lesson 6: Cryptographic Techniques in Ethical Hacking
Lesson 7: Advanced Social Engineering and Ethical Hacking: Red and Blue Teams
Module 4 quiz: Network Security and Ethical Hacking
Module 5: Capstone and Career Advancement in Ethical Hacking
Objectives
Lesson 1: Ethical Hacking Case Studies
Lesson 2: Ethical Hacking Tools and Resources
Lesson 3: Ethical Considerations and Legal Frameworks in Ethical Hacking
Lesson 4: Career Paths in Ethical Hacking
Module 5 Quiz: Capstone and Career Advancement in Ethical Hacking
Conclusion
Course Recap and Summary:
Certificate of Completion
Lesson 5: Ethical Hacking in the Internet of Things (IoT) Landscape
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock