This Advanced Penetration Testing and Ethical Hacking course offers a deep dive into key cybersecurity concepts, providing you with hands-on experience in areas like penetration testing, cryptography, and social engineering. Through engaging modules, you will learn to conduct penetration tests using industry-standard methodologies, such as the Penetration Testing Execution Standard (PTES), and effectively communicate findings through professional reports and executive summaries. You’ll also gain a solid understanding of cryptographic principles, including public key infrastructure (PKI), while mastering techniques for ethical hacking and countering cryptographic attacks. Additionally, the course covers the art of information gathering and social engineering, equipping you to conduct reconnaissance and craft spear phishing attacks. With practical labs and real-world scenarios, this course will help you build the skills needed to protect mission-critical infrastructures and advance your career in cybersecurity.
Overview
Syllabus
- Course Introduction
- The specialization “Introduction to Ethical Hacking” helps you to master essential cybersecurity skills across three comprehensive courses. Begin with Cybersecurity Fundamentals, covering motives, penetration testing, cryptography, and information gathering and social engineering web exploitation, preparing you for diverse cybersecurity challenges.
- Ideology/Motives/Behaviors (Purpose/Goals)
- Discuss the components, content, audience, and purpose for writing a penetration test report/executive summary. Understand the types and generations of hackers, the psychology of hackers, why pen testing is important, the tools used, and the test preparation phases.
- Penetration Testing Report & Executive Summary
- Discussing the components, content, audience, and purpose for writing a penetration test report/executive summary.
- Cryptography and PKI
- Discusses and explores the concepts and properties of One-Way Hashes, Public Key Infrastructure, and Cryptography.
- Information Gathering & Social Engineering
- Discuss the purpose, goals, and methods of conducting information gathering. Covers the tactics and tools used to conduct social engineering activities against asset, person, or system.
Taught by
Jason Crossland