Table of Content
Ethical Hacking Basics
- Penetration Testing
- White Box vs Black Box Versus Gray Box
- Vulnerability Assessment vs Penetration Testing
- Ethical Hacker Responsibilities and Customer Expectations
- Laws and Legal Obligations
Ethical Hacking Process
- Preparation Steps for Penetration Testing
- First Step of Penetration Testing – Reconnaissance
- Scanning, Enumeration, and Fingerprinting
- Vulnerability Assessment
- Exploitation and Access
- Reporting
Kali Linux Test Lab
- Test Lab Requirements
- Diagram and Design
- Test Connectivity
Kali Linux Reconnaissance
- Passive Reconnaissance
- Active Reconnaissance
- Dmitry
- Maltego
Kali Linux and Scanning
- TCP, UDP and, ICMP Scanning
- Nmap – ICMP Scan
- Nmap – TCP Scan
- Nmap – Advanced TCP Scans
- Nmap – UDP Scan
- OS Detection
- Avoid Detection
- Nmap – Scripts and Script Engine
- Nmap Troubleshooting
Kali Linux Vulnerability Scanning and Exploitation
- Nikto
- Sparta
- Ettercap
- Metasploit
- Armitage
Kali Linux Exploitation and Backdoors
- Spear Phishing Attacks
- Credential Harvesting with Website Cloning
- Netcat
- John the Ripper
Apply for certification