logo

Week 15 - Ethical Hacking & Incident Response I (Master)

Week 15 - Ethical Hacking & Incident Response I (Master)
Course content
Introduction
Module Introduction
Week 15 - Kickoff
What Is Ethical Hacking?
The Hacker Mindset
Who Are The Hackers?
Types of Hacking
Black, White and Gray Hat Hackers
Ethical Hackers Duties
Types of Testing
The Usability Triangle
Navigating the Usability Triangle
Harnessing the Hackers
Red, Blue, and Purple Teams
Key Guidelines
Ethics in Cybersecurity
Ethical Hacking Phases
Introduction to Ethical Hacking Phases
From Reconnaissance to Covering Tracks
Simulating the Penetration Testing Role - Knowledge Check
Ethical Hacking Report
Reconnaissance Phase
Staying Anonymous
Google Hacking
OSINT Framework
Drones
War Driving, Flying and Walking
Recon-ng - Tool Introduction
Commands Tab
Ready, Set, Lab! - Working with Recon-ng
Scanning Phase
Network Scanning
Vulnerability Scanning
Nmap - Tool Introduction
How To Work With Nmap
Nmap Cheat Sheet
Ready, Set, Lab! - Nmap Port Scanning
Obtaining Access Phase
Drive-by Attack
Supply Chain Attack
Password Cracking Techniques
Password Cracking Tools
CUPP - Tool Introduction
Hydra - Tool Introduction
Ready, Set, Lab! - RDP Brute Force Attack
Maintaining Access Phase
Backdoor
Rootkit
Covering Tracks Phase
Log Tampering
Introduction to The Cyber Kill Chain
The Seven Stages
"How Can Cyber Kill Chain Protect Against Attacks?
Your Career Guide to Success
Grow Your Professional Network & Achieve Your Career Goals
Week 15 - Weekly Quiz (Master)
10Questions
Week 15 - Key Takeaways

ThriveDX