Lesson 1
Welcome to Ethical Hacking
Meet the instructor, get an overview of the course and start learning about why Ethical Hacking is such an exciting field. Let's get started!
Course
The purpose of this course is to introduce students to the broad set of techniques and job responsibilities associated with the role of an Ethical Hacker. Ethical Hackers leverage their knowledge of business’ processes to evaluate risks while protecting core operations. The results of an Ethical Hacker’s efforts are improvements to business policies, procedures and standards of conduct on its computer systems.
The purpose of this course is to introduce students to the broad set of techniques and job responsibilities associated with the role of an Ethical Hacker. Ethical Hackers leverage their knowledge of business’ processes to evaluate risks while protecting core operations. The results of an Ethical Hacker’s efforts are improvements to business policies, procedures and standards of conduct on its computer systems.
Advanced
4 weeks
Real-world Projects
Completion Certificate
Last Updated July 23, 2024
Skills you'll learn:
Prerequisites:
Lesson 1
Meet the instructor, get an overview of the course and start learning about why Ethical Hacking is such an exciting field. Let's get started!
Lesson 2
Perform a vulnerability scan using automated tools, manage prioritization and response, and score the vulnerabilities you uncover
Lesson 3
Use test scopes to understand the context and objectives of an audit, gather information about our target, research vulnerabilities, execute exploits, and write effective reports on our findings
Lesson 4
Use OWASP WTG methodologies, create HTTP requests to access target systems and employ semi-automated and fully-automated tools in applications audits
Lesson 5
Explore the tactics malicious hackers use to manipulate people to take specific actions, conduct a phishing simulation, create and deploy malware and design an effective landing page
Lesson 6
Employ open-source intelligence techniques to uncover information leakage. Use Exploratory Link Analysis techniques to mine data, establish links between the data and analyze the links
Lesson 7 • Project
Use the skills you have developed in this course to manage a full-fledged security audit of a fictitious company called ExampleCorp
Chairman at Bansal X
Sagar Bansal is a consultant, speaker, and author in the information security industry. He helps large enterprises, governments and intelligence agencies reduce the cost of security by creating reliable and proactive security workflows.
Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.
Demonstrate proficiency with practical projects
Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.
Gain proven experience
Retain knowledge longer
Apply new skills immediately
Top-tier services to ensure learner success
Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.
Get help from subject matter experts
Learn industry best practices
Gain valuable insights and improve your skills
Unlimited access to our top-rated courses
Real-world projects
Personalized project reviews
Program certificates
Proven career outcomes
Full Catalog Access
One subscription opens up this course and our entire catalog of projects and skills.
Average time to complete a Nanodegree program
(17)
2 months
, Advanced
4 weeks
, Intermediate
4 weeks
, Advanced
4 weeks
, Intermediate
(115)
3 months
, Beginner
4 weeks
, Beginner
4 weeks
, Beginner
4 weeks
, Intermediate
4 weeks
, Beginner
4 weeks
, Intermediate
4 weeks
, Intermediate
4 weeks
, Intermediate
4 weeks
, Intermediate
4 weeks
, Beginner
(6)
4 weeks
, Beginner
4 weeks
, Intermediate
Introduction to Ethical Hacking
(17)
2 months
, Advanced
4 weeks
, Intermediate
4 weeks
, Advanced
4 weeks
, Intermediate
(115)
3 months
, Beginner
4 weeks
, Beginner
4 weeks
, Beginner
4 weeks
, Intermediate
4 weeks
, Beginner
4 weeks
, Intermediate
4 weeks
, Intermediate
4 weeks
, Intermediate
4 weeks
, Intermediate
4 weeks
, Beginner
(6)
4 weeks
, Beginner
4 weeks
, Intermediate