This course covers everything you need to know about becoming a certified professional ethical hacker. Participants will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaisance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking.
Security Fundamentals | 51m |
Access Controls | 33m |
Protocols | 36m |
Cryptography | 52m |
Why Vulnerability Assessments? | 36m |
Vulnerability Tools of the Trade | 10m |
Output Analysis and Reports | 13m |
Reconnaisance, Enumeration and Scanning | 51m |
Gaining Access | 31m |
Maintaining Access | 17m |
Covering Tracks | 18m |
Malware | 28m |
Buffer Overflows | 22m |
Password Cracking | 33m |