Udacity Logo
Log InSign Up

Intro to Ethical Hacking

Course

The purpose of this course is to introduce students to the broad set of techniques and job responsibilities associated with the role of an Ethical Hacker. Ethical Hackers leverage their knowledge of business’ processes to evaluate risks while protecting core operations. The results of an Ethical Hacker’s efforts are improvements to business policies, procedures and standards of conduct on its computer systems.

The purpose of this course is to introduce students to the broad set of techniques and job responsibilities associated with the role of an Ethical Hacker. Ethical Hackers leverage their knowledge of business’ processes to evaluate risks while protecting core operations. The results of an Ethical Hacker’s efforts are improvements to business policies, procedures and standards of conduct on its computer systems.

Skills

Owasp wstg

Vulnerability management

Metasploit

Link analysis

Advanced

4 weeks

Real-world Projects

Completion Certificate

Last Updated September 26, 2023

Prerequisites:

Cybersecurity fluency

Course Lessons

Lesson 1

Welcome to Ethical Hacking

Meet the instructor, get an overview of the course and start learning about why Ethical Hacking is such an exciting field. Let's get started!

Lesson 2

Vulnerability Management

Perform a vulnerability scan using automated tools, manage prioritization and response, and score the vulnerabilities you uncover

Lesson 3

System Auditing

Use test scopes to understand the context and objectives of an audit, gather information about our target, research vulnerabilities, execute exploits, and write effective reports on our findings

Lesson 4

Application Auditing

Use OWASP WTG methodologies, create HTTP requests to access target systems and employ semi-automated and fully-automated tools in applications audits

Lesson 5

Social Engineering

Explore the tactics malicious hackers use to manipulate people to take specific actions, conduct a phishing simulation, create and deploy malware and design an effective landing page

Lesson 6

OSINT

Employ open-source intelligence techniques to uncover information leakage. Use Exploratory Link Analysis techniques to mine data, establish links between the data and analyze the links

Lesson 7 • Project

Audit ExampleCorp

Use the skills you have developed in this course to manage a full-fledged security audit of a fictitious company called ExampleCorp

Taught By The Best

Photo of Sagar Bansal

Sagar Bansal

Chairman at Bansal X

Sagar Bansal is a consultant, speaker, and author in the information security industry. He helps large enterprises, governments and intelligence agencies reduce the cost of security by creating reliable and proactive security workflows.

Taught By The Best

Photo of Sagar Bansal

Sagar Bansal

Chairman at Bansal X

Sagar Bansal is a consultant, speaker, and author in the information security industry. He helps large enterprises, governments and intelligence agencies reduce the cost of security by creating reliable and proactive security workflows.

Get Started Today

Intro to Ethical Hacking