19 hours 55 minutes

Video Transcription

I welcome the course on penetration testing in ethical hacking. My name is Ken Underhill, and in this course, we're gonna do a prep for the certified ethical hacker Examination.
So some of the things that we're gonna cover in this course we're just gonna go through the course modules
so much of one, we're gonna cover the basics. So that's why you should even be a penetration test for ethical hacker. We're gonna also cover some of the basic knowledge you're gonna need to know to be successful in this course. And we'll also cover things like black white versus gray hat, blue versus Red team script, kiddies and more.
And Marshall, too, we're gonna jump into footprint. So if you just think of this as we're gaining information on our target So we're gonna do passive and active footprint and we'll talk about the differences. Were gonna have some labs to show us in different ways that we can gather information about a target
in module three. It's kind of a bigger model we're gonna do standing and enumeration, which are separate sections on the City Council official material. And then also we're gonna incorporate vulnerabilities, which is a new section on the newer examination they have out. So we're incorporating basically three sections, and there's not a whole lot information of vulnerability, so we just kind of took it in there as well.
So we're gonna learn about things like
the three way handshake TCP header flags, different types of scans that we can do. Fingerprinting operating systems was gonna learn about different vulnerability, scanning tools
and much, much more.
In March of four, we're gonna go over system hacking. So that's where we're gonna talk about things like backdoors, remote access, trojans steganography, et cetera.
Number five, we have male wears. We're gonna talk about worms, viruses, Trojan. We're gonna talk about it a little bit about banking Trojans. That's one of the focuses of the new examination material from Easy Council. They talk about a lot about banking. Trojans
module six. We have sniffing, so we're going to use tools like wire shark. We're gonna try to see what kind information we can gather from the network.
Martin's seven. We have social engineering. We're actually gonna do a lab where we do a little social engineering reconnaissance, so it's a good fun lab that you could do, like with on your on yourself. And she work on information you have out there and then also on your family and friends as well
modulate. We jump into denial of service and distributed to dollars service. So you talk about things like botnets
Module nine. We move into session. Hijackings were actually have a lab where we do some session hijacking and we gather some information.
The module 10 we combined What servers and Web application, which again are two separate sections on the City Council Official material. We just confined it into that and we talk about some different common attacks and the client server relationship
module 11. We're gonna talk about sequel injection, but we're gonna talk about the different types of attacks that you can do with it.
Model 12. We jump into a WiFi. So basically hacking WiFi or Bluetooth, we talk a lot about wireless networks,
ones of 13. We go in our mobile section, so mobile hacking a security. We talk about different operating systems. So android IOS common attacks for each one, but also some of the tools that we can use for those attacks.
Monitor 14. We have intrusion detection and prevention systems, firewalls and honey pots.
Much of 15 would go into a I OT So this is a newer section on the new material for the surf. Unethical hackers Sam on. Basically, if you think of I o. T devices, you'll notice the mobile section, and those correlate a lot on the different types of attacks.
Months of 16 would cover the clouds. We talk about different types of cloud solutions, or cloud service is we also talk a little bit about a cloud attacks as well.
And Marshall 17. We go over cryptography, so we learn different things, like the difference between symmetric and asymmetrical photography. We also talk about hashing, and we do actual hashing lab where we analyze a couple of photos.
And finally we wrap up the course with module 18. That's our report. So we actually go through a report template at a high level, just walk into three some of the things you would need the list on a penetration report.
So you might be wondering, Well, who am I?
Well, of course, my name is Ken Underhill. I'm a certified ethical hacker as well as a computer hacking forensic investigator again. Both those certifications are through easy counsel.
I'm also an agent professor of digital forensics.
I do write questions for the computer hacking forensic investigator exam as well as I've reviewed content for the new reversion of the certified ethical hacker exam. And no, I can't share the answers with you.
Also hold a masters in cyber security information insurance, as well as an undergraduate in information systems and cyber security management.
I've also helped thousands of people globally passed both this fine ethical hacker and the computer hacking forensic investigator exam.
So how is this course structured? Well, we were a lot of sections. We're gonna start off with a couple of pre assessment questions as well as some post assessment questions. You also noticed that throughout the different labs as well. Basically, if I think you need to understand something a little better, Ah, list a couple of questions to test your knowledge
Now also, I want to point out in Montana one you should have some downloadable resource is along with, like, notes and stuff like that. I have to help you out
once we're gonna have video lectures so predominately video lectures as well as a lot of labs to give you that hands on experience
and then has mentioned resource is to help you as you study for the actual certified ethical hacker examination to help you retain the knowledge. And I'm gonna share with you my actual notes that I use to Path E passed the exam as well as some tips that I've got for you covering the information on the newer material for the exam again, I'm not gonna give you an exam questions. I'll tell you what's on the exam.
But these are things that I think you probably want to know, even not for the example more so in industry as well.
So in the next section, we're gonna go over macho one the basics. So again, that's gonna cover things like why you should become ethical hacker penetration tester,
different types of things you might need to know about in advance of things like the s. I model
the differences between black, white and gray hat different laws that we need to know about as well as the C I a tree out and much, much more.
We're also gonna have a fun little quick win lab in there. So I'm not gonna spoil it for you to make sure you look at Margit One and check out that lab.

Up Next

Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor