logo

Chapter 09 - Ethical Hacking & Incident Response I

Chapter 09 - Ethical Hacking & Incident Response I
Course content
Chapter Kick-off
Ethical Hacking & Incident Response I | Kick-off
Foundations of Ethical Hacking
What Is Ethical Hacking?
The Hacker Mindset
Who Are The Hackers?
Types of Hacking
Black, White and Gray Hat Hackers
Ethical Hackers Duties
Types of Testing
The Usability Triangle
Navigating the Usability Triangle
Harnessing the Hackers
Red, Blue, and Purple Teams
Key Guidelines
Ethics in Cybersecurity
Ethical Hacking Phases
Introduction to Ethical Hacking Phases
From Reconnaissance to Covering Tracks
Reconnaissance Phase
Staying Anonymous
Google Hacking
OSINT Framework
Drones
War Driving, Flying and Walking
Recon-ng - Tool Introduction
Commands Tab
Ready, Set, Lab! - Working with Recon-ng
Scanning Phase
Network Scanning
Vulnerability Scanning
Nmap - Tool Introduction
How To Work With Nmap
Nmap Cheat Sheet
Ready, Set, Lab! - Nmap Port Scanning
Obtaining Access Phase
Drive-by Attack
Supply Chain Attack
Password Cracking Techniques
Password Cracking Tools
CUPP - Tool Introduction
Hydra - Tool Introduction
Ready, Set, Lab! - RDP Brute Force Attack
Maintaining Access Phase
Backdoor
Rootkit
Covering Tracks Phase
Log Tampering
Introduction to The Cyber Kill Chain
The Seven Stages
"How Can Cyber Kill Chain Protect Against Attacks?
Chapter Closure
Ethical Hacking & Incident Response I Quiz
10Questions

TechDX