Ethical Hacking & Penetration Testing - Part 2
Learn to hack computer systems and networks so you can secure them like security experts through the Central InfoSec CTF!
Welcome to Your Course!
Connect With Us
Central InfoSec Cyber Security Courses
Your Lab Environment
VMware & Virtual Box
Vulnerable VMs for Hacking
Lab Setup - Metasploitable 2
Cybersecurity 101 Overview
Introduction to Cybersecurity
CIA Triad
Understanding Cybersecurity Fundamentals
Areas of Cybersecurity
Cybersecurity Teams
Red vs Blue vs Purple
Cybersecurity Roles
Cybersecurity Career Paths
5 Year Cybersecurity Career Roadmap
Ethical Hacking & Penetration Testing
Threat Actors
Threat Landscape
Hacker Hats
Threats, Risks, Attacks, & Vulnerabilities
NIST & NVD
MITRE ATT&CK & CVE
CVSS
OWASP
Cyber Security Control Frameworks
Secure Design Principles
Configuration Management
Change Management
Data Integrity Using Hashing
Identity & Access Management
Vulnerability & Patch Management
Risk Assessment & Management
Business Continuity
Security Technologies
Data Security
Network Security
Cloud Security
Web Security
Email Security
Social Engineering & Human Factor
Cybersecurity Awareness
Incident Response and Management
Legal & Ethical Aspects of Cybersecurity
Compliance Automation Tool
Tradecraft, Cryptography & Steganography
OSINT Open-Source Intelligence
Google Hacking
Google Hacking Database (GHDB)
Password Hacking
Breached Passwords
Basic Cybersecurity Best Practices
Emerging Technologies & Future Trends
Cybersecurity CTFs
Key Takeaways
Ethical Hacking, Penetration Testing Methodology, & Tradecraft 101 Overview
Legal Concerns
Compliance
Vulnerabilities, Exploits, Payloads, Shellcode, & Shells
Penetration Testing Introduction
Penetration Testing Methodology - Overview
Penetration Testing Methodology - Pre-Engagement Interactions
Penetration Testing Methodology - Intelligence Gathering
Penetration Testing Methodology - Threat Modeling
Penetration Testing Methodology - Vulnerability Analysis
Penetration Testing Methodology - Exploitation
Penetration Testing Methodology - Post Exploitation
Penetration Testing Methodology - Reporting
Tradecraft
Cryptography
Steganography
Key Takeaways
Google Hacking, OSINT, & Reconnaissance 101 Overview
Open-Source Intelligence (OSINT)
OSINT Framework & theHarvester
OSINT with ReconSpider, Recon-ng, Wayback Machine, & Data Leaks
IP Address, CIDR, AS, & ASN OSINT
Domain OSINT
Domain Enumeration
Subdomain OSINT
Website OSINT & Backlinks
Website Technology Profiling
Image OSINT
Metadata OSINT
Email Address OSINT
Username OSINT
Social Media OSINT
Phone Number OSINT
Address & Voter Records OSINT
Vehicle & Insurance OSINT
Breached Passwords OSINT
Google Hacking
Google Hacking Database (GHDB)
OSINT for Social Engineering
Key Takeaways
Nmap 101 Overview
Nmap Introduction
Installing Nmap on Windows
Installing Nmap on Linux
Default Scan Settings
Running Nmap
Nmap Version & Help
Understanding Port Statuses
Host Discovery
DNS Resolution
Listing IP Addresses in a Subnet
Scanning a Single Host
Scanning Multiple Hosts
Scanning a Single Port
Scanning Multiple Ports
Scanning in Fast Mode
Scanning Top Ports
Scanning All Ports
Scanning Ports in Sequential Order
Displaying Open Ports
Service Version Detection
Operating System Detection
Traceroute
Default Script Scans
OS, Version, Scripts, & Traceroute
Key Takeaways
We recommend this hacking course just for you