![]() You'll learn how to dig up information on a client using open source intelligence. Reconnaissance and Information Gathering.This section overviews the five stages of hacking, which we will dive deeper into as the course progresses. You'll learn the ins and outs of Python 3 and by the end, you'll be building your own port scanner and writing exploits in Python. ![]() This section will introduce you to one of the most commonly used languages among ethical hackers, Python. Most ethical hackers are proficient in a programming language. This section will introduce you to the basics of Linux and ramp up into building out Bash scripts to automate tasks as the course develops. Every good ethical hacker knows their way around Linux. ![]() We will discuss common ports and protocols, the OSI model, subnetting, and even walk through a network build with using Cisco CLI. This section focuses on the concepts of computer networking. We will discuss the important tools you can use to keep notes and be successful in the course and in the field. An ethical hacker is only as good as the notes he or she keeps. What does an ethical hacker do on a day to day basis? How much can he or she make? What type of assessments might an ethical hacker perform? These questions and more will be answered. A Day in the Life of an Ethical Hacker.Students can still participate in the course, but may experience slow lab environments. For Active Directory Lab Build: A minimum of 16GB of RAM is suggested. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |