logo

9 TOOLKIT- Ethical Hacking and Incident Response

9 TOOLKIT- Ethical Hacking and Incident Response
Course content
00 - Module Opening
Introduction to Ethical Hacking and Incident Response
01 - Introduction to Ethical Hacking + Ethical Hackinf Phases + Network Hacking
Opening Session
Self-learning Materials
Closing Session
Lab Solution Video: Performing Reconnaissance
Lab Solution Video: Scanning with Nmap
Lab Solution Video: Initiating a Brute Force Attack
Lab Solution Video: Network Hacker Lab
02 - (OOP) - Ethical Hacking Group Investigation Challenge
Opening Session
Opening Session - CVE - PRESENTATION
Self-learning Materials
Closing Session
03 - Web Application Hacking (Part A)
Opening Session
Self-learning Materials
Closing Session
04 - Web Application Hacking (Part B)
Opening Session
Self-learning Materials
Closing Session
Lab Solution Video: Types of XSS Lab
Lab Solution Video: XSS Challenges Lab
05 - Web Application Hacking (Part C)
Opening Session
Self-learning Materials
Closing Session
Lab Solution Video: Democracy Under Attack Lab
06 - Incident Response
Opening Session
Self-learning Materials
Closing Session
07 - Capture-the-Flag + Final Exam + Scenario
Opening Session
Self-learning Materials
Closing Session
Lab Solution Video: Scenario - Night Time Cyber-Attack
Report Solution Document - Final Scenario

ThriveDX