One Column Portfolio Subheading

Tutorial Introduction

Subheading

  • Tutorial Introduction
    • Welcome to the Ethical Hacker Tutorial
    • The Fictional Companies in this Tutorial
    • What You Will Learn in This Tutorial
    • Ethical Hacking Statement

In this introducory opener to the Ethical Hacking tutorialm ipsum dolor sit amet, consectetur adipisicing elit. Laudantium veniam exercitationem expedita laborum at voluptate. Labore, voluptates totam at aut nemo deserunt rem magni pariatur quos perspiciatis atque eveniet unde.

View Project

Module 1: Introduction to Ethical Hacking and Penetration Testing

Learning the Lay of The Land

  • 1.0 Introduction
    • 1.0.1 Why You Should Take This Module
    • 1.0.2 What You Will Learn in This Module
  • 1.1 Understanding Ethical Hacking and Penetration Testing
    • 1.1.1 Overview
    • 1.1.2 Why We Need PenetrationTesting
    • 1.1.3 Lab - Researching PenTesting Careers
    • 1.1.4 Threat Actors
  • 1.2 Exploring Penetration Testing Methodologies
    • 1.3 Building Your Own Lab
    • 1.4 Summary

    Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium veniam exercitationem expedita laborum at voluptate. Labore, voluptates totam at aut nemo deserunt rem magni pariatur quos perspiciatis atque eveniet unde.

    View Project

Module2: Planning and Scoping a Penetration Testing Assessment

Learning Where You Can and Where You Can't Go

  • 2.0 Introduction
  • 2.1 Comparing and Contrasting Governance, Risk, and Compliance (GRC) Concepts
  • 2.2 Explaining the Importance of Scoping and Organizational or Customer Requirements
  • 2.3 Demonstrating an Ethical Hacking Mindset for Maintaining Professionalism
  • 2.4 Summary

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Ut, odit velit cumque vero doloremque repellendus distinctio maiores rem expedita a nam vitae modi quidem similique ducimus! Velit, esse totam tempore.

View Project

Module 3: Information Gathering and Vulnerability Scanning

Finding Out What's Out There

  • 3.0 Introduction
  • 3.1 Performing Passive Reconnaissance
  • 3.2 Performing Active Reconnaissance
  • 3.3 Understanding the Art of Performing Vulnerability Scans
  • 3.4 Understanding How to Analyze Vulnerability Scan Results
  • 3.5 Summary

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Omnis, temporibus, dolores, at, praesentium ut unde repudiandae voluptatum sit ab debitis suscipit fugiat natus velit excepturi amet commodi deleniti alias possimus!

View Project

Module 4: Social Engineering Attacks

The Most Dangerous Of Them All

  • 4.0 Introduction
  • 4.1 Pretexting for an Approach and Impersonation
  • 4.2 Social Engineering Attacks
  • 4.3 Physical Attacks
  • 4.4 Social Engineering Tools
  • 4.5 Methods of Influence
  • 4.6 Summary

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Explicabo, quidem, consectetur, officia rem officiis illum aliquam perspiciatis aspernatur quod modi hic nemo qui soluta aut eius fugit quam in suscipit?

View Project

Module 5: Exploiting Wired and Wireless Networks

???

  • 5.0 Introduction
  • 5.1 Exploiting Network-Based Vulnerabilities
  • 5.2 Exploiting Wireless Vulnerabilities
  • 5.3 Summary Attacks

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Aliquid, quo, minima, inventore voluptatum saepe quos nostrum provident ex quisquam hic odio repellendus atque porro distinctio quae id laboriosam facilis dolorum.

View Project

Module 6: Exploiting Application-Based Vulnerabilities

???

  • 6.0 Introduction
  • 6.1 Exploiting Network-Based Vulnerabilities
  • 6.2 Exploiting Wireless Vulnerabilities
  • 6.3 Summary Attacks

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Aliquid, quo, minima, inventore voluptatum saepe quos nostrum provident ex quisquam hic odio repellendus atque porro distinctio quae id laboriosam facilis dolorum.

View Project


    Copyright © Your Website, year