menu
menu
Sign up
Log in
About
Chapter 10 - Ethical Hacking & Incident Response II - Ethical Hacker - 12/25
Course content
Chapter Kick-off
Chapter Kick-off
Section 1
1
lesson
Ethical Hacking & Incident Response II | Kick-off
Network Hacking
Introduction
Section 1
2
lessons
Introduction to Network Hacking
Vulnerabilities and Security Misconfigurations
Metasploit
Section 2
10
lessons
Penetration Testing Framework
The Metasploit Framework - Tool Introduction
How To Work With Metasploit
Metasploit Terminology
Auxiliary and Exploit Modules
How to Use Metasploit’s Interface
Exploits
Payloads
Databases
Meterpreter
The Network Hacker
Section 3
2
lessons
Ready, Set, Lab! - Common Metasploit Applications
Network Hacker - Lab Instructions
Web Application Hacking
Introduction
Section 1
2
lessons
Introduction to Web Application Hacking
Securing Web Applications
OWASP Top 10
Section 2
13
lessons
Types of Vulnerabilities
OWASP Top 10
What Is OWASP?
Broken Access Control
Cryptographic Failures
Injection
Insecure Design
Security Misconfiguration
Vulnerable and Outdated Components
Identification and Authentication Failures
Software and Data Integrity Failures
Security Logging and Monitoring Failures
Server-Side Request Forgery (SSRF)
Incident Response
Introduction to Incident Response
Section 1
5
lessons
Introduction to Incident Response
Security Incident
Computer Security Incident Response Team (CSIRT)
From Detection to Remediation
Popular Frameworks
Innovative Cyber-attacks
Section 2
5
lessons
History of Incidents
Dyn Cyber Attack
WannaCry Ransomware Attack
Equifax Breach
Uber Hack
Incident Response Plan
Section 3
7
lessons
NIST Incident Response
The Road to Recovery
Preparation
Detection and Analysis
Containment, Eradication, and Recovery
Post-Incident Activity
Incident Response Plan - Knowledge Check
Incident Response Simulation
Section 4
6
lessons
Introduction to Incident Response Simulation
Preparation - Knowledge Check
Detection and Analysis - Knowledge Check
Containment, Eradication, and Recovery - Knowledge Check
Post-Incident Activity - Knowledge Check
Incident Response Cases
Capture-the-flag
Capture-the-flag
Section 1
8
lessons
What is Application Security Testing?
Application Security Testing
Burp Suite - Tool Introduction
Exploring Burp Suite - Dashboard
Exploring Burp Suite - Proxy
Discover Your Inner Hacker
The Challenge
Bug Bounty
Chapter Closure
Chapter Closure
Section 1
1
exam
Ethical Hacking & Incident Response II Quiz
10
Questions