CompTIA Ethical Hacker+
Ethical Hacker Pro is a comprehensive training course designed to prepare you to master ethical hacking concepts and skills. It focuses on identifying vulnerabilities, securing systems, and testing networks in today’s technology-driven environments. With hands-on simulations and certification prep, this course ensures you are ready to excel in cybersecurity roles that require ethical hacking expertise.
- 4 weeks
- 40 lessons
Upon course completion students will be able to:
Footprinting and ReconnaissanceFootprinting and reconnaissance involve gathering information about a target organization’s security posture, including network topology, system configurations, and potential vulnerabilities.
Network Scanning and EnumerationNetwork scanning and enumeration involve using tools to identify active hosts, open ports, and services running on a network, providing valuable information for further exploitation.
Vulnerability Assessment and ExploitationVulnerability assessment and exploitation involve identifying and exploiting known vulnerabilities in systems, applications, and networks to gain unauthorized access or disrupt operations.
Password Cracking and SniffingPassword cracking and sniffing involve using tools to crack password hashes or intercept passwords in transit, allowing unauthorized access to systems and data.
Social Engineering and PhishingSocial engineering and phishing involve manipulating individuals into divulging sensitive information or performing certain actions that compromise security, such as clicking on malicious links or downloading malware.
Web Application Security TestingWeb application security testing involves identifying vulnerabilities in web applications, such as SQL injection or cross-site scripting (XSS), and exploiting them to gain unauthorized access or steal sensitive data.
Wireless Network Security AssessmentWireless network security assessment involves identifying vulnerabilities in wireless networks, such as weak encryption or authentication protocols, and exploiting them to gain unauthorized access.
Post-Exploitation and Pivoting TechniquesPost-exploitation and pivoting techniques involve maintaining access to a compromised system, escalating privileges, and moving laterally within a network to gain further access and control.