Ethical Hacking Essentials: Reconnaissance & Exploits

collapse

Course Details

This course can only be taken as part of the Certificate in Ethical Hacking.

Get Program Details

About this Course


This course will introduce you to the foundations and landscape of ethical hacking. You'll become familiar with basic penetration testing concepts, including reconnaissance and exploitation, and begin to learn broad security domain concepts such as network, web and application security.

What You'll Learn

  • The purpose of threat modeling and the end-to-end penetration testing process
  • The underlying technology of modern systems, including Linux kernel and userspace, networking stacks and application services
  • Attack surface discovery tools, such as Nmap, DNS lookups and Shodan searching
  • Network scanning techniques, such as sniffing with tcpdump, port scanning, application fingerprinting and vulnerability scanning
  • Browser security fundamentals and common web application and services vulnerabilities, such as SQL injection, SSRF and buffer overflows

Get Hands-On Experience

You’ll start using real-world penetration testing tools such as active checkers (Nmap port scanning and vulnerability scanning), passive checkers (DNS lookups and tcpdump) and Metasploit for exploitation of application-specific scenarios. 

digital badge example

EARN A DIGITAL BADGE

After successfully completing this course, you can claim a digital achievement badge. Learn about digital badges.

  Get our email newsletter with career tips, event invites and upcoming program info.       Sign Up Now