Ethical Hacking Course- Functional Cybersecurity

Students

Pentester & Red Teamers

Course category

Offensive Cybersecurity

Completed

01/09/2022

149,00

Category:
Share:

Course Description

If you want to get started in the world of cybersecurity, specifically in the branch of Ethical Hacking, do not hesitate to enroll in this introductory course in which completely updated contents will be taught.

With a total duration of 35 teaching hours, divided between 20 hours of practical training and 15 hours of theoretical material, you will be able to benefit from the most complete, up-to-date and low-cost introductory course to Ethical Hacking on the market. You will be able to follow the course from the comfort of your home, according to your own schedule and at your own pace. You will have a total of 12 months to finish the theoretical part and 3 more months for the practical part.

The course covers general cybersecurity concepts, the basic operation of Kali Linux with its various tools, and the phases of an ethical hacking cycle. Subsequently, a practical task of an intrusion to two current computer systems, is undertaken in a controlled environment using the methodology and phases of ethical hacking that will be explained throughout the course.

To take the course it is advisable that the student has some basic user-level knowledge of computers. It is also advisable for the student to have access to a computer with at least an i3 processor, 4GB of RAM, and an Internet connection in order to download all the labs and material from the e-learning platform.

In order to obtain the Certificate of Training the student must take a 15-question multiple-choice exam with a pass mark of 60% or higher. In addition, a practical exam must be taken, which must be passed with a minimum grade of 65%.

Course aims

  • To learn the different techniques and intrusion tools used by cybercriminals to penetrate a computer system.
  • You will gain the necessary knowledge of the standard methodology for conducting professional ethical hacking audits with their corresponding executive and technical reports.
  • This course has a mainly practical approach, making it easy for the student to learn usable knowledge.
  • The course includes internationally recognized steps, standards and best practices to comply with while conducting system penetration audits.

1. General Concepts of Cybersecurity – Ethical Hacking

  • Introduction to Cybersecurity – Ethical Hacking.
  • The need for Cybersecurity in today’s world.
  • Hacker terminology.
  • Ethical hacking vs. vulnerability assessment.

2. Ethical Hacking – Phases and types of attacks.

  • Ethical Hacking Cycle.
  • Examples of Ethical Hacking methodology – Penetration test.
  • Most common and effective types of attacks.

3. Ethical Hacking – Tools and Distributions

  • Distributions to develop tasks in Cybersecurity.
  • Kali Linux: features and tools.
  • Setting up testing labs with virtual machines.

4. Practical Ethical Hacking Task – System Intrusion and information exfiltration.

  • Definition of the scope and objectives of the system to be audited.
  • Reconnaissance analysis of ports and services.
  • Analysis of vulnerabilities.
  • Exploitation: penetrating the target machine.
  • Post-exploitation: maintaining access.
  • Erasure of traces: elimination of system “logs”

5. Practical Ethical Hacking Task – Smartphone intrusion and information exfiltration.

  • Definition of the scope and objectives of the system to be audited.
  • Reconnaissance, analysis of ports and services.
  • Creation of malware to take control of Smartphones with Android OS.
  • Exploitation: launching attacks and penetrating the target machine.
  • Post-exploitation: maintaining access.
  • Erasing traces: deleting “logs” from the system.
  • Conclusions and recommendations.

6. Netcat and Crypcat – The Swiss Army Knives of hacking

  • Introduction and disclaimer.
  • Performing Bind Shell on LAN.
  • Performing Reverse Shell on LAN.
  • Performing Reverse Shell on external networks.
  • Evading the Firewall of the Windows machine.
  • Installing “netcat” as a backdoor on a Windows OS.
  • Analyzing incoming and outgoing connections with Wireshark.
  • Conclusions and recommendations: “ncat”.

7. Reports for a real audit

  • Types of reports and authorizations.
  • Agreement and confidentiality model for cybersecurity audits.
  • Technical report model.
  • Executive report model.

8. Final exam and case study – JMSec Certificate of Completion

  • Final theoretical exam.
  • Ethical hacking case study.

9. Additional Resources

  • Notes for Red Team Operations.
  • Other resources of interest.

Methodology

  • The course is carried out using the following elements:
    • For each lesson the student will be provided with videos and documents in PDF format.
    • The student will perform practical exercises using virtual machines properly configured and prepared for the course.
    • The student will take a final test, as well as a practical test, in order to demonstrate the knowledge acquired throughout the course.

     

    This course is also designed to be able to be taken offline using the different downloadable resources provided.

Spain