Course Overview

The knowledge pool for Ethical Hackers is only so deep. The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas of most exam providers.  

This course does not provide you with any specific answers to any exam.

Ethical Hacking fundamentals do not change from one exam to the next.  You can expect to see questions about Nmap, what commands were used to generate a specific output, and which tool would you use regardless of the exam vendor. 

You'll be expected to know which Pentesting Framework would be used to meet a specific condition.

You'll be expected to know what information should be delivered in an executive summary. You'll be expected to know how to scope an assessment and identify what document is used for what purpose.

You'll be expected to know the OWASP Top 10 and identify the hacking methodology used to exploit each one.

These are just a few fundamentals that remain constant from one Ethical Hacking exam vendor to the next.

This course provides you with the fundamental knowledge every ethical hacker is expected to know. Throughout this course, you will learn about cybersecurity tools, reverse shells, scripting basics, identifying output, and what commands were used to generate the output.

This course is strictly hands-on and applied to learning. This course is designed to teach you many of the skills expected of an Ethical Hacker when starting out or sitting their first cybersecurity exam.

This course is dynamic meaning that it is updated as new material becomes available.

The necessary resources for this course are in the "Resources" section of Video 1.1. You can also access them through this direct link - https://github.com/ec-council-learning/Pentesting-Fundamentals-for-Beginners

What You Will Learn

  • The fundamentals of ethical hacking.
  • Identify security tools and ethical hacking techniques
  • Identify and exploit web application vulnerabilities.
  • Identify the appropriate documentation for starting and finalizing a pentest.
  • Correct reporting procedures.
  • Analyze threats and vulnerabilities within context of ethical hacking.
  • Identify the appropriate pentesting framework for meeting the needs of a specific client.
  • Identify the appropriate exploit for a given vulnerability.

Program Curriculum

  • Create a Virtual Install of Kali Linux
  • Create a Virtual Install of Windows 10
  • Create a Virtual Install of Metasploitable2 Using VirtualBox
  • Create a Virtual Install of Metasploitable3 Using VirtualBox
  • Create a Virtual Install of OWASP
  • Taking a Snapshot of Your Current Configuration
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Scoping the Engagement
  • Statement of Work (SOW) Document
  • Rules of Engagement (ROE) Document
  • Master Service Agreement (MSA), NDA
  • Pentesting Final Report
  • Chapter 2 Quiz

  • Overview of MITRE ATT&CK framework
  • Overview of the NIST Pentesting Framework
  • Overview of the Penetration Testing Execution Standard (PTES)
  • Chapter 3 Quiz

  • Introduction to Nmap
  • Nmap Service and Open Port Scan
  • Nmap OS Detection
  • Nmap Service and Version Detection
  • Nmap Host Discovery
  • Nmap Scripting Engine (NSE)
  • Analyzing Nmap Results
  • Chapter 4 Quiz

  • Perform a Vulnerability Scan Using OpenVAS
  • Chapter 5 Quiz

  • Using Banner Grabbing to Aid in Reconnaissance
  • Enumerating Windows 10 Using WinPEAS
  • Chapter 6 Quiz

  • Creating a Persistent Backdoor Using Service Persistence
  • Create a Windows Reverse Shell Using PowerShell
  • Launch a Graphic Console Window Using SSH and XTERM
  • Chapter 7 Quiz

  • Window 7/10 Privilege Escalation Using UAC Bypass
  • Verify Windows Privilege Escalation: Unquoted Service Path
  • Windows Privilege Escalation Unquoted Service Path
  • Chapter 8 Quiz

  • Overview of OWASP Top 10
  • Assemble Fake TCPIP Packets Using Hping3
  • Identify Active Network Hosts and Services Using Nmap
  • Perform a Vulnerability Scan Using OWASP Zed Attack Proxy
  • Chapter 9 Quiz

  • Configuring Burp Suite as a Proxy
  • Web Application Firewall Detection Using WAFW00F
  • Perform a SQL Injection Attack Using Sqlmap
  • Exploit Vulnerable Web Applications Using Command Injection
  • Exploiting HTTP PUT Method
  • Brute Forcing WordPress Password
  • Chapter 10 Quiz

  • Compiling Exploit Code for Linux Using GCC
  • Prepare a Windows OVA file for Your Virtual Lab Environment
  • Cross Compiling Windows Exploits Using Mingw-w64
  • Chapter 11 Quiz

  • Local File Inclusion Using Kali Web Shells PHP Scripts
  • File Transfer Using HTTP and PowerShell’s WebClient Object
  • Python3 SimpleHTTPServer
  • String Slicing Using Python
  • Disable Windows 10 UAC Using PowerShell
  • Chapter 12 Quiz
Load more modules

Instructor

Cliff Krahenbill Krahenbill

Cliff Krahenbill has worked in technology since 1998 working as a Microsoft Support Technician, a Microsoft Certified Trainer, a technology support specialist, a Senior Network Technology Consultant, an IT Auditor and most recently as the owner and operator of his own technology firm, CLK Technology Solutions located in Tucson Arizona. Cliff's expertise in technology focuses on designing, building, supporting network infrastructures, and network security.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8