Introduction
Black, White and Gray Hat Hackers
Navigating the Usability Triangle
Red, Blue, and Purple Teams
Ethical Hacking Phases
Introduction to Ethical Hacking Phases
From Reconnaissance to Covering Tracks
Simulating the Penetration Testing Role - Knowledge Check
War Driving, Flying and Walking
Recon-ng - Tool Introduction
Ready, Set, Lab! - Working with Recon-ng
Week 15 - Working with Recon-ng
2Questions
Ready, Set, Lab! - Nmap Port Scanning
Week 15 - Nmap Port Scanning
2Questions
Password Cracking Techniques
Hydra - Tool Introduction
Ready, Set, Lab! - RDP Brute Force Attack
Week 15 - RDP Brute Force Attack
2Questions
Introduction to The Cyber Kill Chain
"How Can Cyber Kill Chain Protect Against Attacks?
Your Career Guide to Success
Grow Your Professional Network & Achieve Your Career Goals