Information Technology
Star icon
Most Popular
Hands on Training icon
Hands On Training
Star icon
Hands on Training icon

Becoming a Hacker: An Introduction to Ethical Hacking, Penetration Testing, and Bug Hunting

Course Cover
compare button icon

Course Features

icon

Duration

2 days

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Instructor Paced

icon

Video Content

8 hours

Course Description

You can start your career in ethical hacking or penetration testing by becoming a Hacker. Omar Santos is a best-selling speaker and security author who will lead this two-day intensive training. This training includes live discussions, demonstrations and insight from someone who has been at the forefront of hacking. Expert insights into the methods used to compromise networks will be available. Learn about ethical hacking legal issues and associated risks. The course also covers the many tools and systems that can be used in order to hack into a wireless or wired network.

You don't need any prior experience in ethical hacking or penetration testing. After being introduced to offensive cybersecurity concepts, you will then be guided through a complete penetration testing process from start to finish. Passive and active reconnaissance, vulnerability assessment, exploitation and post-exploitation will all be covered. This two-day course is a good place to start if you are looking for certifications like the Offensive Security Certified Professional Certification (OSCP), CEH Practical, PenTest+ or the GIAC Penetra Tester (GPEN). If you are interested in bug hunting and bug bounty exploration, this live training session can help.

This two-day course can also be helpful to those who are looking for certifications like the Offensive Security Certified Professional Certification (OSCP), CEH Practical, PenTest+ or the GIAC Pennetration Tester(GPEN).

Course Overview

projects-img

Live Class

projects-img

Human Interaction

projects-img

Personlized Teaching

projects-img

International Faculty

projects-img

Case Based Learning

projects-img

Post Course Interactions

projects-img

Case Studies,Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

Course participants should have a basic understanding of cybersecurity and networking concepts.

What You Will Learn

Fundamentals of Wireless Hacking

How to Maintain Persistence, Pivoting, and Data Exfiltration

Introduction to Buffer Overflows

Introduction to Evasion and Post Exploitation Techniques

Introduction to Hacking Networking Devices

Introduction to Hacking User Credentials

Introduction to Hacking Web Applications

Introduction to Social Engineering

Learn fundamentals of ethical hacking or security penetration testing

Learn how to build your lab with WebSploit, Kali Linux, and Parrot Security to perform different penetration testing and bug hunting scenarios

Open Source Intelligence (OSINT)

Passive and Active Reconnaissance

Vulnerability Scanning

Web Application Injection Attacks and Hacking Databases

Web Application Reconnaissance

Writing Penetration Testing Reports

Course Cover