Ethical Hacking Course – Expert Cybersecurity
If you dream of becoming an ethical hacking professional, capable of performing “Pentest” type audits on computer systems, or getting started in “Red Team” type operations, do not hesitate to enrol in this course in which totally up-to-date contents will be taught. This expert hacking course is in Spanish, and is also known as “advanced professional offensive cybersecurity course”.
With an estimated duration of ten to twelve weeks (230 hours), you will enjoy a very complete and low-cost advanced course in offensive cybersecurity. You will be able to follow the course from the comfort of your own home, studying at your own pace and according to your own schedule. You have a total of 12 months to finish the theoretical part and 3 more months for the practical part.
The course explains advanced cybersecurity concepts, attacks on different operating systems, network attacks, search and exploitation of “buffer overflow” (BoF) vulnerabilities, etc. The practical tasks are carried out under a secure environment using virtual machines.
To take the course it is advisable for the student to have acquired the knowledge taught in the introductory course on Ethical Hacking. Having access to a computer with at least an i5 processor, 8GB of RAM, and Internet connection to be able to download all the labs and material from the virtual learning platform is also recommended.
In order to obtain the Certificate of Completion of the course, the student must take a 50-question final exam of the course contents with a pass mark of 60% or more. He/she must also take a practical exam which must be passed with a minimum grade of 60%.
- This course provides the necessary theoretical and practical knowledge to be able to perform professional “Pentest” type audits on systems, and covers some concepts to be developed in “Red Team” operations.
- With this course, you will gain the necessary knowledge to be able to develop your own methodology for performing more elaborate and refined professional ethical hacking audits, with their corresponding executive and technical reports.
- This course has a mainly practical approach, making it easier for the student to learn and use the acquired knowledge.
- The course includes internationally recognized steps, standards and best practices to comply with while conducting ethical hacking audits.
0. General Concepts of Cybersecurity – Ethical Hacking
- Introduction to Cybersecurity – Ethical Hacking.
- The need for Cybersecurity in today’s world.
- Hacking terminology.
- Ethical hacking vs. vulnerability scanning.
1. Course Introduction
- Analysis Scenario
- Actions to carry out.
- Ethical Hacking Phases.
- Penetration of the organization’s WiFi networks.
- Once inside the organization’s LAN.
2. Preparation phase
- Test parameters.
- Machines to be used for the audit and how to configure them.
3. Penetration in the organization’s WiFi networks
- Breaking WIFI networks with WEP security protection.
- Finding out WIFI network access credentials with WPA2 security.
- Mitigation of vulnerabilities found.
4. External and internal reconnaissance phase of the organization
- Discovering machines and LAN characteristics.
- Man In The Middle (MITM): Capturing credentials with Ettercap, Wireshark, SSLStrip2 and Delorean.
- DNS Spoofing: Phishing with SEToolkit and automatic malware download with Evilgrade.
5. Vulnerability scanning and analysis phase
- Router scanning and analysis.
- Scanning and analysis of the surveillance camera.
- Scanning and analysis of the machine with S.O Windows XP sp3.
- Scanning and analysis of the machine with S.O Windows10.
- Scanning and analysis of the machine with S.O Linux (DVL).
6. Phase of Exploitation of the vulnerabilities found
- Router Exploitation.
- Surveillance camera exploitation.
- Exploitation of machines with S.O Windows XP sp3.
- Exploitation of machines with S.O Windows 10.
- Exploitation of machines with S.O Linux (DVL).
7. How to exploit the obtained “Shell’s”
- Use of the obtained “Shell” of commands.
- Use of the obtained “Meterpreter session”.
- Use of a “Webshell”.
8. Establishing permanence within the target machines
- On machines with Windows O.S.
- On machines with Linux O.S.
9. Elimination of traces in different Operating Systems
- On machines with S.O Windows.
- On machines with Linux O.S.
10. Analysis Phase: Mitigation of the vulnerabilities found
11. Reporting Phase: executive and technical reports
12. Inconveniences of the use of “Netcat” in audits
13. Final conclusions
A1. Netcat and Crypcat – The Swiss Army Knives of hacking
A2. Buffer Overflow (BoF): In Detail
A3. Capturing credentials with Wireshark
A4. Hacking Team “Hacked”
X. Final exam and Case Study – JMSec Certificate of Completion
- Final theoretical exam.
- Ethical hacking case study.
- In order to complete the course:
- – The student is offered video tutorials and documents in PDF format.
- – The student will perform practical exercises using virtual machines properly configured and prepared for the course.
- – The student will be given the opportunity to practice in the JAYMON SECURITY Ethical Hacking Lab, which consists of several machines with different operating systems that simulate a local area network (LAN) of a business organization (price on request).
- – The student will take a final test, as well as a practical test, in order to demonstrate the knowledge acquired throughout the course.
This course is also designed to be able to be taken offline using the different downloadable resources provided.