Chapter Kick-off
Ethical Hacking & Incident Response I | Kick-off
Foundations of Ethical Hacking
Black, White and Gray Hat Hackers
Navigating the Usability Triangle
Red, Blue, and Purple Teams
Ethical Hacking Phases
Introduction to Ethical Hacking Phases
From Reconnaissance to Covering Tracks
War Driving, Flying and Walking
Recon-ng - Tool Introduction
Ready, Set, Lab! - Working with Recon-ng
Ready, Set, Lab! - Nmap Port Scanning
Password Cracking Techniques
Hydra - Tool Introduction
Ready, Set, Lab! - RDP Brute Force Attack
Introduction to The Cyber Kill Chain
"How Can Cyber Kill Chain Protect Against Attacks?
Chapter Closure
Ethical Hacking & Incident Response I Quiz
10Questions