Overview

Cydefe's Ethical Hacking Assessment is an Assessment Lab on Cybrary. The Cydefe Ethical Hacking Assessment is an Intermediate Assessment Lab designed for Intermediate students in the Ethical Hacker, Pentester, Red Team, Offensive Security, and Security Testing fields.

The Cydefe Ethical Hacking Assessment will cover skills across the offensive security discipline. Students will learn to perform: • Information Gathering – The discipline of identifying key target areas, vulnerable systems, open-source intelligence, and basic configuration and design information to enable the Ethical Hacking process. • Reconnaissance – The process of passively and actively monitoring and investigating the systems identified during Information Gathering in order to determine activity, patterns of behavior, potential insecurity, detailed configuration, and potentially hidden attack vectors. • Initial Access – The mechanism by which a system becomes compromised. The Ethical Hacker makes use of the intelligence gathered in previous phases and finds their first foothold in the system or network to be hacked. • Privilege Escalation – The term used to describe a hacker increasing the number and quality of privileges they have in the target system or network. The Ethical (or, frankly, unethical) Hacker uses this stage to enable continued access, further access, or deeper and more impactful access. • Post-Exploit Hacking – The catch-all term used to describe the process of pivoting through the network, identifying key targets, and using the newfound access in order to accomplish mission objectives. • Track Covering (Usually referred to as Covering Tracks) – In which the Ethical Hacker conceals their behavior in an attempt to prevent discovery.

In a controlled, curated environment.

The Cydefe Ethical Hacking Assessment will also determine a student’s ability to effectively use Ethical Hacking tools like Nmap, John the Ripper, Metasploit, Kali Linux, and many more. Students who successfully complete the Cydefe Ethical Hacking Assessment will have demonstrated proficiency accomplishing the tasks for which these tools were developed.

The Cydefe Ethical Hacking Assessment is part of the Pentester/Ethical Hacker Cybrary Career Path, and is one of the primary means by which a student can demonstrate their Ethical Hacking skills. To successfully complete the Cydefe Ethical Hacking Assessment, a student will need to review the Cybrary training materials related to the various disciplines of Penetration Testing.

About CyDefe

CyDefe was founded in 2015 with a goal to educate others about risks and threats, so they could protect themselves better. CyDefe focuses on providing students with assessments, including CTF (Capture-the-flag) challenges, on a variety of cybersecurity subjects, including ethical hacking. The company’s mission is to help people understand the “cyber world.” Proven to enhance your understanding and skill level, the hands-on assessments provide an efficient and convenient source to further your education on your own time. The catalog is fully browser-based making learning accessible wherever you have internet access. Search assessments based on the desired topic, skill level, or correlation to career type. You can learn individually or with your team while tracking performance using Cybrary’s data and analytic metrics. Organizations all over the world train their employees with the CyDefe catalog on Cybrary. The myriad of assessments will leverage your company as you practice with premium learning resources and develop the industry’s most sought after skills. You can also access content tailored to job roles giving you the ability to train employees based on needed job fulfillment and skills levels. Employees can also develop and master skills essential to the roles they wish to acquire and gain the experiential skills needed to progress in the field. Access the CyDefe catalog, along with a variety of other lab vendors, through Cybrary for Business or Cybrary Insider Pro.

Delivered By

Cydefe

About CyDefe

CyDefe was founded in 2015 to educate others about risks and threats so that they could protect themselves better. CyDefe focuses on providing students with assessments, including CTF (Capture-the-flag) challenges, on a variety of cybersecurity subjects mainly focused on penetration testing and ethical hacking. The company’s mission is to help people understand the “cyber world.” The hands-on assessments are proven to enhance your understanding and skill level and provide an efficient and convenient source to further your education on your own time. The catalog is entirely browser-based making learning accessible wherever you have internet access — search assessments based on the desired topic, skill level, or correlation to career type. You can learn individually or with your team while tracking performance using Cybrary’s data and analytic metrics. Organizations all over the world train their employees with the CyDefe catalog on Cybrary. The myriad of assessments will leverage your company as you practice with premium learning resources and develop the industry’s most sought after skills. You can also access content tailored to job roles giving you the ability to train employees based on needed job fulfillment and skills levels. Employees can also develop and master skills essential to the positions they wish to acquire allowing them to progress in their field. Access the CyDefe catalog, along with a variety of other lab vendors, through Cybrary for Business or Cybrary Insider Pro.

What is Included in the CyDefe Labs Catalog?

CyDefe provides users with a variety of Capture the Flag assessments that are a fun way to learn and gain hands-on experiences. The catalog is composed of game-based labs and users are referred to as “players.” This interactive catalog is the most effective way to train cybersecurity or I.T. teams. The entire CyDefe catalog is accessible through Cybrary which contains the following lab topics:

SOC (Junior) SOC (Entry) SOC (Senior) CTF Pentest Attacks 101 ATT&CK Matrix Basic Network Devices Basic Network Protocols Cable basics Cryptography Encryption basics Incident Response Linux Basics Linux System Admin Basics Memory Analysis Basics Network Types OSI Model OSINT Packet Analysis Packet Analysis Basics Password Hashes Recon Registry Analysis Reverse Engineering Steganography TCP/IP basics Vulnerability Scan Windows Basics ICS Packet Analysis

Access Unlimited CyDefe Labs

With this catalog of secure coding labs, you and your team will have completely unlimited, on-demand access to CyDefe's game-based secure coding training that can be used anytime, and anywhere. These labs are included in the Cybrary for Business package, as well as Cybrary Insider Pro, and all access occurs directly through the Cybrary website. All labs are completed directly in the user’s browser and can be stopped and started at any time.