FC 3.4 Ethical Hacking Fundamentals
Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity.
Instructor LED
Overview
What is Information Security?
Need for Security
Elements of Information Security
The Security, Functionality, and Usability Triangle
Security Challenges
Motives, Goals, and Objectives of Information Security Attacks
Information Security Attack Vectors
All info
Overview
Cyber Kill Chain Methodology
Tactics, Techniques, and Procedures (TTPs)
Indicators of Compromise (IoCs)
Categories of Indicators of Compromise
What is Hacking?
Who is a Hacker?
Hacker Classes/Threat Actors
Understand Different Phases of Hacking Cycle
Why Ethical Hacking is Necessary
Hacking Techniques & Guide
Instructor LED
Instructor LED
Overview
Module Flow
Define Threat and Threat Sources
What is a Threat?
Examples of Threats
Threat Sources
Module Flow
Define Malware and its Types
Introduction to Malware
Different Ways for Malware to Enter a System
Common Techniques Attackers Use to Distribute Malware on the Web
Components of Malware
Module Flow
Types of Malware
Malware Countermeasures
Moudle Flow
Define Vulnerabilities
What is Vulnerability?
Vulnerability Classification
Impact of Vulnerabilities
Module Flow
Define Vulnerability Assessment
Vulnerability Research
What is Vulnerability Assessment?
Vulnerability-Management Life Cycle
Vulnerability Exploitation
Module Summary
Instructor LED
Overview
Password Cracking
Password Complexity
Types of Password Attacks
Dictionary, Brute-Force, and Rule-based Attack
Password Guessing
Default Passwords
Trojans/Spyware/Keyloggers
Pass the Ticket Attack
Wire Sniffing
Man-in-the-Middle and Replay Attacks
Rainbow Table Attack
Password Cracking Tools
Discuss Password Cracking Countermeasures
INSTRUCTOR LED
Overview
Module Flow
What is Social Engineering?
Common Targets of Social Engineering
Impact of Social Engineering Attack on an Organization
Factors that Make Companies Vulnerable to Attacks
Types of Social Engineering
Phishing
Phishing Tools
Fake Security Applications
Social Engineering Countermeasures
How to Detect Phishing Emails
Social Engineering Tools