Overview

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course.

Course Content

Module 1: Introduction

05:56
1.1 Course Introduction
10:21
1.2 CIA Black White Grey Hats
07:01
1.3 Laws
05:30
1.4 Bonus VB and Kali
07:53
1.5 Password Crack Lab Instructions

Module 2: Footprinting

05:58
2.1 Intro Pre-assessment
11:45
2.2 Footprinting Basics
01:39
2.3 Lab Intro
05:56
2.4 Footprinting NIKTO Lab Instructions
06:25
2.5 Footprinting Harvester Lab Instructions
04:48
2.6 Footprinting Shodan Lab Instructions
06:50
2.7 Footprinting Google Hacking Lab Instructions

Module 3: Scanning and Enumeration

02:36
3.1 Scanning and Enumeration Introduction
04:21
3.2 TCP 3 Way Handshake
10:48
3.3 Banner Grabbing
02:22
3.4 Live Systems Lab Instructions Part 1
02:49
3.5 Live Systems Lab Instructions Part 2
04:08
3.6 Live Systems Lab Instructions Part 3
02:23
3.7 Live Systems Lab Instructions Part 4
20:00:00
Certified Ethical Hacker (CEH)
03:21
3.8 Port Check Lab Instructions Part 1
02:21
3.9 Port Check Lab Instructions Part 2
03:05
3.10 Port Check Lab Instructions Part 3
04:05
3.11 Scanning Techniques Lab Instructions Part 1
03:31
3.12 Scanning Techniques Lab Instructions Part 2
02:21
3.13 Scanning Techniques Lab Instructions Part 3
04:06
3.14 Scanning Techniques Lab Instructions Part 4
05:00
3.15 Scanning Techniques Lab Instructions Part 5
03:08
3.16 Scanning Techniques Lab Instructions Part 6
04:46
3.17 Scanning Techniques Lab Instructions Part 7
02:40
3.18 Scanning Techniques Lab Instructions Part 8
02:30
3.19 Scanning Techniques Lab Instructions Part 9
04:50
3.20 Scanning Techniques Lab Instructions Part 10
03:43
3.21 Scanning Techniques Lab Instructions Part 11
06:05
3.22 OS Fingerprinting Lab Instructions Part 1
05:53
3.23 OS Fingerprinting Lab Instructions Part 2
05:00
3.24 Mapping Networks Lab Instructions Part 1
03:23
3.25 Mapping Networks Lab Instructions Part 2
06:40
3.26 Mapping Networks Lab Instructions Part 3
10:21
3.27 Mapping Network Lab Instructions Part 4
03:07
3.28 Banner Grabbing Lab Instructions Part 1
02:59
3.29 Banner Grabbing Lab Instructions Part 2
02:45
3.30 Banner Grabbing Lab Instructions Part 3
03:55
3.31 Banner Grabbing Lab Instructions Part 4
04:21
3.32 Enumeration Tools Lab Instructions Part 1
02:58
3.33 Enumeration Tools Lab Instructions Part 2
02:54
3.34 Enumeration Tools Lab Instructions Part 3
03:59
3.35 Enumeration Tools Lab Instructions Part 4

Module 4: System Hacking

08:45
4.1 System Hacking
07:23
4.2 Planting a Backdoor Lab Intro
11:02
4.3 Planting a Backdoor Lab Instructions Part 1
11:20
4.4 Planting a Backdoor Lab Instructions Part 2

Module 5: Malware

08:08
5.1 Malware Viruses
07:45
5.2 Malware Worms and Trojans
05:55
5.3 Trojan Protection Lab Intro
02:45
5.4 Malware Stinger Lab Instructions
02:11
5.5 Malware CurrPorts Lab Instructions
04:07
5.6 Malware TCP View Lab Instructions
12:12
5.7 Malware Whats Running Lab Instructions
10:01
5.8 Malware Hash Calc Lab Instructions

Module 6: Sniffing

06:24
6.1 Sniffing
13:40
6.2 Sniffers Lab Intro
13:24
6.3 Sniffing Wireshark Lab Instructions
07:21
6.4 Sniffing MAC Spoof Lab Instructions

Module 7: Social Engineering

12:23
7.1 Social Engineering
09:21
7.2 Social Engineering Reconnaissance Lab Intro
01:00
7.3 Social Engineering Lab Instructions

Module 8: Denial of Service

02:35
8.1 Denial of Service

Module 9: Session Hijacking

03:45
9.1 Session Hijacking
03:40
9.2 Session Hijacking Lab Intro
07:48
9.3 Session Hijacking Lab Instructions Part 1
03:43
9.4 Session Hijacking Lab Instructions Part 2

Module 10: Web Servers and Apps

04:37
10.1 Web Server
06:55
10.2 Web Applications
03:57
10.3 Web Server Lab Intro
05:43
10.4 Web Tool Burp Suite Lab Instructions

Module 11: SQL Injection

07:15
11.1 SQL Injection

Module 12: Hacking WiFi and Bluetooth

03:47
12.1 WiFi and Bluetooth

Module 13: Mobile Hacking and Security

07:00
13.1 Mobile Android Part 1
05:49
13.2 Mobile Android Part 2
05:43
13.3 IOS Architecture and Jailbreaking
09:32
13.4 IOS Mobile Device Management

Module 14: IDS, Firewalls, and Honeypots

12:06
14.1 IDS
06:49
14.2 Firewalls
05:51
14.3 Honeypots

Module 15: IoT

07:20
15.1 IoT Basics
04:56
15.2 IoT and OWASP Basics
08:00
15.3 IoT Surface Area Tools

Module 16: Cloud

12:50
16.1 Cloud
06:34
16.2 Cloud Attacks
10:12
16.3 Cloud Final

Module 17: Cryptography

04:22
17.1 Algorithm Cryptography C
04:56
17.2 Algorithm and Hash Cryptography
02:24
17.3 Cryptography Tools
05:42
17.4 PKI, Disk Encryption, Email Encryption
06:57
17.5 Cryptography Lab Instructions Part 1
03:55
17.6 Cryptography Lab Instructions Part 2
05:43
17.7 Photo Cryptography Lab Instructions
02:15
17.8 Bonus Cryptography Lab Instructions
06:51
17.9 Cryptography Final

Module 18: Reports

04:21
18.1 Reporting

Module 19: Review

04:43
19.1 Course Summary
04:00:00
EC Council Certified Ethical Hacker v8
01:30:00
Ethical Hacking (CEH Preparation)

Course Description

About the Online Penetration Testing and Ethical Hacking Training

If you are considering working in the cyber security industry, then this training will benefit you greatly. With Cybrary's free online Penetration Testing and Ethical Hacking course, you will learn how to protect users from cyber attackers by becoming an ethical hacker and learning to exploit networks yourself. As the internet continues to advance, cybercrimes do as well. Criminals no longer need to leave their homes to commit crimes, they can do so easily with a few clicks of a mouse and an internet connection. While current technology has given us access to huge amounts of information on websites and mobile devices and simplified tasks like shopping, paying bills, and banking services, it has also given rise to the need for ethical hackers to battle cyber criminals. There is no better time than now to begin a career in the cyber security industry. Ethical hackers are able to help private businesses, public organizations, and government agencies infiltrate their secure systems to identify flaws and weaknesses within those systems. They determine which system areas are safe and which need additional security to help prevent threats to vulnerable networks, like malware attacks. In the Penetration Testing and Ethical Hacking training, you will master objectives including Intrusion Detection, Policy Creation, reconnaissance with Social Engineering and Google, DDoS Attacks, Buffer Overflows and Virus Creation. Upon completion of this online training, students will have all the tools required for the development and application of an effective vulnerability prevention strategy to prevent the attackers from entering key systems. Are you hoping to become a penetration tester? Do you want to become a SOC analyst? This course could take you one more step down your career path toward your goal. Sign up for Cybrary's Career Path program today!

What is Ethical Hacking and Penetration Testing?

Ethical hacking involves penetration testing in that the networking expert methodically attempts to penetrate a network or computer system as a service to the owner of the system to find security vulnerabilities that a malevolent hacker may be able to exploit. While ethical hackers often use the same techniques and methods to test and penetrate systems as their criminal counterparts, they do so to document vulnerabilities and provide system owners with advice on how to fix them, rather than taking advantage of the weaknesses. An education in ethical hacking allows "white hat" hackers to evaluate the security of a system or network's infrastructure. It involves identifying and attempting to exploit any weaknesses to conclude if the potential for unauthorized access or other malicious or criminal activities exists. Weaknesses are often found in improper or poor system configuration, unknown and known computing or hardware flaws, and operational process weaknesses or technical countermeasures. By learning to hack ethically, security professionals in the industry are able to identify and overcome these vulnerabilities and provide system owners with solutions, security, and peace of mind.

What Jobs Are Available for Ethical Hackers?

The cybersecurity job market is thriving, and it isn't expected to slow down anytime soon. Expectations predict a growth from $75 billion in 2015 to a whopping $170 billion by the year 2020. Obtaining work in this industry can mean a great income, job security, and advancement potential. In 2017, nearly a quarter of a million jobs in the cyber security industry in the U.S. are unfilled and the growth of job postings in this area is up almost 75% over the last several years. There are many business opportunities, including company management positions, available for professional hackers in today's workforce. Some common titles for professional hacking experts include: security consultant, ethical hacker, penetration tester, information security analyst, cyber security analyst, security engineer, security analysis, data security engineer, information security manager, digital forensics analyst, site administrator, network security specialist, and IT auditor. In addition to careers in the corporate sector, there is ample opportunity for lucrative cyber security positions in top government agencies as well. The National Security Agency (NSA), Department of Defense (DoD) and the Committee on National Security Systems (CNSS) are all federal agencies who use ethical hacking to maintain privacy and prevent unauthorized access to sensitive government information.

How Do I Obtain An Ethical Hacking Certification?

Once you complete the Penetration Testing and Ethical Hacking course (and any other applicable courses), you may consider moving ahead and obtaining a certification. The first step toward certification may be some advanced study on penetration testing and ethical hacking strategies, depending on your experience, skills level, and overall knowledge. You can obtain resources to help you prepare for certification. When you are ready, you may opt to take the exam for the Certified Ethical Hacker (CEH) certificate, by the EC-Council, which is the most sought-after and recognizable certification available in this field. While not all ethical hacking positions require that you have certifications, it is a valuable credential to present to new or potential employers, as it shows that you have a fundamental knowledge of how to protect their systems using ethical hacking and penetration testing as the cornerstone of your methodology. The CEH certification involves an exam with 125 questions that you have four hours to complete, and terms require that you have passing score of at least 70% to receive your certificate. You can contact the EC-Council for more information. No longer will money have dominion over our ability to learn. Penetration testing and ethical hacking are skill sets as in-demand as anything else in the Cyber Security industry. Previous to Cybrary, this type of training was very expensive, and now it is free. Anyone who wants to become a penetration tester, ethical hacker (CEH), now has the opportunity to learn and do so, at no cost. To best prepare for the exam, check out our free CEH study guide, practice exam as an assessment of your education, and virtual lab (to get real world, hands-on experience). CEU / CPE: 35

Total Clock Hours: 35 hrs, 16 mins

Get a Certificate of Completion

If you enjoy this course, be sure to view the Computer Forensics course or the Advanced Pentesting class next, always free at Cybrary!

Do you know someone who could benefit from this training class? Email them an invite and they can join you, and you earn member points!

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor

Provided By

Course Components

On Demand Videos from industry leaders
Virtual Labs to gain hands on experience and apply what you learned
Practice Tests to check your knowledge and prepare for certifications

Certificate of Completion

Certificate Of Completion

Complete this course and earn a Penetration Testing and Ethical Hacking Certificate of Completion