IT & Software

Learn Ethical Hacking and Penetration Testing | EHPT+

Course Overview

  • Course Title: Learn Ethical Hacking and Penetration Testing | EHPT+
  • Instructor: OCSALY Academy | 460.000+ Students
  • Target Audience: Budding cybersecurity enthusiasts, network administrators, individuals with a profound interest in technology and security
  • Prerequisites: Very Basic computer understanding needed

Curriculum Highlights

  • Key Topics Covered:
    • Metasploit Framework
    • Linux Command Line
    • Network Security Fundamentals
    • Vulnerability Assessment
    • Information Gathering
    • FTP Server Hacking
    • SMB Exploitation
    • Web Server Vulnerabilities
    • SSH User Enumeration
    • SSH Brute Forcing
    • Industrial Control Systems (ICS) Pentesting
    • Creating ICS Pentest Labs
    • Ethical Hacking Skills
    • Console Commands
    • Variables in Metasploit
    • Network Security Basics
    • Network Mapping
    • Network Protocols
    • Email Communication
    • Packet Data Units (PDUs)
    • Switches and Routers
    • Network Security Guidelines
    • Threat Modeling
    • Linux Command Line
    • Command Pipelines
    • File and Directory Manipulation
    • Permissions in Linux
    • Processes in Linux
    • Package Management in Linux
    • Networking in Linux
    • Wireshark and Network Traffic Analysis
    • Intrusion Detection Systems (IDS)
  • Key Skills Learned:
    • Understanding Metasploit Modules
    • Using Console Commands
    • Working with Variables
    • Network Security Fundamentals
    • Vulnerability Assessment
    • Information Gathering
    • FTP Server Hacking
    • SMB Exploitation
    • Web Server Vulnerabilities
    • SSH User Enumeration
    • SSH Brute Forcing
    • Industrial Control Systems (ICS) Pentesting
    • Creating ICS Pentest Labs
    • Ethical Hacking Skills
    • Network Security Basics
    • Network Mapping
    • Network Protocols
    • Email Communication
    • Packet Data Units (PDUs)
    • Switches and Routers
    • Network Security Guidelines
    • Threat Modeling
    • Linux Command Line
    • Command Pipelines
    • File and Directory Manipulation
    • Permissions in Linux
    • Processes in Linux
    • Package Management in Linux
    • Networking in Linux
    • Wireshark and Network Traffic Analysis
    • Intrusion Detection Systems (IDS)

Course Format

  • Duration: 11 hours on-demand video
  • Format: Self-paced online course
  • Resources:
    • 1 downloadable resource
    • Access on mobile and TV
    • Certificate of completion
Get Coupon on Udemy