
Ce cours est conçu pour vous préparer avec un ensemble de compétences en tant que hacker éthique et vous fournir une solide compréhension de la sécurité offensive.
Vous deviendrez compétent dans l'art de définir les objectifs, d'exécuter et de rendre compte des évaluations de vulnérabilités.
En comprenant la mentalité des acteurs malveillants, vous serez en mesure de mettre en œuvre plus efficacement des contrôles de sécurité et de surveiller, analyser et répondre aux menaces de sécurité actuelles..
Il est recommandé d'avoir des connaissances de base sur les réseaux et la programmation pour entamer ce cours.
Programme de formation
Welcome to the Ethical Hacker Course
The Fictional Companies in the Ethical Hacker Course
What Will I Learn in This Course?
Ethical Hacking Statement
The Fictional Companies in the Ethical Hacker Course
What Will I Learn in This Course?
Ethical Hacking Statement
1.0. Introduction
1.1. Understanding Ethical Hacking and Penetration Testing
1.2. Exploring Penetration Testing Methodologies
1.3. Building Your Own Lab
1.4. Summary
1.1. Understanding Ethical Hacking and Penetration Testing
1.2. Exploring Penetration Testing Methodologies
1.3. Building Your Own Lab
1.4. Summary
2.0. Introduction
2.1. Comparing and Contrasting Governance, Risk, and Compliance Concepts
2.2. Explaining the Importance of Scoping and Organizational or Customer Requirements
2.3. Demonstrating an Ethical Hacking Mindset by Maintaining Professionalism and Integrity
2.4. Summary
2.1. Comparing and Contrasting Governance, Risk, and Compliance Concepts
2.2. Explaining the Importance of Scoping and Organizational or Customer Requirements
2.3. Demonstrating an Ethical Hacking Mindset by Maintaining Professionalism and Integrity
2.4. Summary
3.0. Introduction
3.1. Performing Passive Reconnaissance
3.2. Performing Active Reconnaissance
3.3. Understanding the Art of Performing Vulnerability Scans
3.4. Understanding How to Analyze Vulnerability Scan Results
3.5. Summary
3.1. Performing Passive Reconnaissance
3.2. Performing Active Reconnaissance
3.3. Understanding the Art of Performing Vulnerability Scans
3.4. Understanding How to Analyze Vulnerability Scan Results
3.5. Summary
4.0. Introduction
4.1. Pretexting for an Approach and Impersonation
4.2. Social Engineering Attacks
4.3. Physical Attacks
4.4. Social Engineering Tools
4.5. Methods of Influence
4.6. Summary
4.1. Pretexting for an Approach and Impersonation
4.2. Social Engineering Attacks
4.3. Physical Attacks
4.4. Social Engineering Tools
4.5. Methods of Influence
4.6. Summary
5.0. Introduction
5.1. Exploiting Network-Based Vulnerabilities
5.2. Exploiting Wireless Vulnerabilities
5.3. Summary
5.1. Exploiting Network-Based Vulnerabilities
5.2. Exploiting Wireless Vulnerabilities
5.3. Summary
6.0. Introduction
6.1. Overview of Web Application-Based Attacks for Security Professionals and the OWASP Top 10
6.2. How to Build Your Own Web Application Lab
6.3. Understanding Business Logic Flaws
6.4. Understanding Injection-Based Vulnerabilities
6.5. Exploiting Authentication-Based Vulnerabilities
6.6. Exploiting Authorization-Based Vulnerabilities
6.7. Understanding Cross-Site Scripting (XSS) Vulnerabilities
6.8. Understanding Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery Attacks
6.9. Understanding Clickjacking
6.10. Exploiting Security Misconfigurations
6.11. Exploiting File Inclusion Vulnerabilities
6.12. Exploiting Insecure Code Practices
6.13. Summary
6.1. Overview of Web Application-Based Attacks for Security Professionals and the OWASP Top 10
6.2. How to Build Your Own Web Application Lab
6.3. Understanding Business Logic Flaws
6.4. Understanding Injection-Based Vulnerabilities
6.5. Exploiting Authentication-Based Vulnerabilities
6.6. Exploiting Authorization-Based Vulnerabilities
6.7. Understanding Cross-Site Scripting (XSS) Vulnerabilities
6.8. Understanding Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery Attacks
6.9. Understanding Clickjacking
6.10. Exploiting Security Misconfigurations
6.11. Exploiting File Inclusion Vulnerabilities
6.12. Exploiting Insecure Code Practices
6.13. Summary
7.0. Introduction
7.1. Researching Attack Vectors and Performing Attacks on Cloud Technologies
7.2. Explaining Common Attacks and Vulnerabilities Against Specialized Systems
7.3. Summary
7.1. Researching Attack Vectors and Performing Attacks on Cloud Technologies
7.2. Explaining Common Attacks and Vulnerabilities Against Specialized Systems
7.3. Summary
8.0. Introduction
8.1. Creating a Foothold and Maintaining Persistence After Compromising a System
8.2. Understanding How to Perform Lateral Movement, Detection Avoidance, and Enumeration
8.3. Summary
8.1. Creating a Foothold and Maintaining Persistence After Compromising a System
8.2. Understanding How to Perform Lateral Movement, Detection Avoidance, and Enumeration
8.3. Summary
9.0. Introduction
9.1. Comparing and Contrasting Important Components of Written Reports
9.2. Analyzing the Findings and Recommending the Appropriate Remediation Within a Report
9.3. Explaining the Importance of Communication During the Penetration Testing Process
9.4. Explaining Post-Report Delivery Activities
9.5. Summary
9.1. Comparing and Contrasting Important Components of Written Reports
9.2. Analyzing the Findings and Recommending the Appropriate Remediation Within a Report
9.3. Explaining the Importance of Communication During the Penetration Testing Process
9.4. Explaining Post-Report Delivery Activities
9.5. Summary
10.0. Introduction
10.1. Understanding the Basic Concepts of Scripting and Software Development
10.2. Understanding the Different Use Cases of Penetration Testing Tools and Analyzing Exploit Code
10.3. Summary
10.1. Understanding the Basic Concepts of Scripting and Software Development
10.2. Understanding the Different Use Cases of Penetration Testing Tools and Analyzing Exploit Code
10.3. Summary
Ethical Hacker Course Final Exam
Course Final Exam
End of Course Survey
Course Final Exam
End of Course Survey