How to Become Certified Ethical Hacker (W1)

$69.00

Out of stock

The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription


Hakin9′s Hack the Box Series is our first workshop that will help you become Certified Ethical Hacker.

It consists of 12 online Modules including 3 Hacking Challenges. You will learn how to become certified ethical hacker with hands-on experience in hacking, exploiting the vulnerabilities and rooting the system.


 SYLLABUS


Module1


    • Base Knowledge

        • Introduction


        • What is a hacker?


        • Hackers Methodology


        • The phases of Ethical Hacking




 Module 2


    • Building Blocks for Penetration Testing

        • What is Penetration Testing?


        • Penetration Testing Methodology


        • Vulnerability Assessment


        • Exploitation




 Module 3


    • Hack the Face Value

        • Setting up the Target


        • Information Gathering


        • What is nmap ?




Module 4


    • Master Your Scanning Skills

        • Types of Scanning


        • Port Scanning Options


        • Nmap cheat sheet


        • Port Scanning & Service Detection


        • Operating System Fingerprinting


        • NSE – Scripting Engine & Vulnerability Discovery




Module 5


    • Hack in the Web Box

        • Typical Layout of Web Server & Application Hosting


        • Known Vulnerabilities in Web Serves and Web Applications


        • Lab 01 – Hacking In The Box via MSF


        • Lab 02 – Hacking the Box via SQL Injections & SQLMAP


        • Types of SQL Injections


        • Lab 03 – Practicing on Vulnerable Web Application


        • Practice more Injections


        • Lab 04 – Exploiting Command Execution Attack Via Metasploit and getting Shell


        • Lab 05




Module 6


    • Buffer Overflows Exploits Overview

        • What is an exploit?


        • How exploit work?


        • Downloading Virtual PC


        • Scenario




Module 7


    • Vulnerability Discovery & Research

        • What is a vulnerability?


        • How do you discover a vulnerability in the target system?


        • Vulnerability Scanners


        • LAB


        • Report Generation




Module 8


    • Mastering the Metasploit Framework (360 Degree)

        • What is Metasploit?


        • The Metasploit Architecture and Fundamentals


        • Port Scanning with Metasploit


        • Password Sniffing with Metasploit


        • Write your own Customized Scanner


        • Vulnerability Scanning with Metasploit


        • Exploit Development with Metasploit and Mona.py


        • Code Generation with Mona.py


        • The Meterpreter




 Module 9


Hack the Box Basic Challenge


 Module 10


Hack the Box Intermediate Challenge


Module 11


Hack the Box Expert Challenge


Module 12


    •  Write Penetration Testing Report

        • Key Tips by industry leading organizations in writing penetration-testing report


        • What should the report contain?


        • Short summary of vulnerabilities detected


        • Test Team Details


        • The main body of the report


        • Sample report




Module 13


How o Become a Certificate Ethical Hacking – Workshop eBook


FINAL EXAM

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013