What You Need to Know Before
You Start
Starts 5 June 2025 02:58
Ends 5 June 2025
00
days
00
hours
00
minutes
00
seconds
20 hours 31 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Paid Course
Optional upgrade avallable
Overview
Welcome to this course, where you will learn everything you need to know to become an expert in Ethical Hacking and Cybersecurity!
Syllabus
- Introduction to Ethical Hacking and Cybersecurity
- Setting Up the Hacking Environment
- Networking Fundamentals
- Reconnaissance Techniques
- Scanning and Enumeration
- Exploitation Techniques
- Web Application Security
- Wireless Network Security
- Cryptography Basics
- Social Engineering
- Security Monitoring and Incident Response
- Developing Cybersecurity Policies
- Ethical Hacking Project
- Future Trends in Cybersecurity
- Course Review and Q&A
Overview of cybersecurity landscape
Importance of ethical hacking in today's world
Legal and ethical considerations
Installing and configuring Virtual Machines (VMs)
Introduction to Kali Linux and its tools
Network configuration for testing
Understanding basic networking concepts
Introduction to IP addresses, subnets, and routing
Common network protocols and services
Passive information gathering
Active information gathering
Tools for reconnaissance
Network scanning techniques
Port scanning with Nmap
Vulnerability scanning tools
Introduction to metasploit
Exploiting common vulnerabilities
Privilege escalation techniques
Understanding OWASP Top 10
Common web app vulnerabilities (SQL Injection, XSS, etc.)
Web app penetration testing methodology
Wireless network protocols and standards
Securing Wi-Fi networks
Attacking wireless networks
Understanding encryption and hashing
Use of cryptography in cybersecurity
Breaking encryption mechanisms
Techniques of social engineering attacks
Phishing and other human-based attacks
Mitigating social engineering threats
Introduction to Security Information and Event Management (SIEM)
Incident response planning and execution
Forensics basics and tools
Creating effective security policies
Security awareness training
Risk management and compliance
Real-world penetration testing project
Reporting vulnerabilities ethically
Presentation of findings and defense strategies
Emerging threats and technologies
AI and machine learning in cybersecurity
Career paths and certifications in ethical hacking and cybersecurity
Recap of key concepts
Discussion of real-world applications
Final Q&A session
Taught by
Santiago Hernández
Subjects
Information Security (InfoSec)