Ethical Hacking Crash Course

Learn the essential skills for ethical hacking and penetration testing in this hands-on crash course. Ethical hacking involves using the same techniques as malicious hackers, but in a legal and legitimate way to evaluate the security vulnerabilities in computer systems and web applications.

This course receives regular updates – please check our blog for new releases.

Expected Completion Time: 2-3 hours

Difficulty: Easy

NOTE: This course is not fully optimized for mobile and may have issues when navigating. We recommend taking this course on your desktop or laptop for the best experience.

Introduction

An Introduction into the World of Ethical Hacking and Penetration Testing. We will discuss differences between ethical hacking, penetration testing and red teaming. We will briefly touch upon the important the legalities and ethics of hacking and penetration testing.

Lessons

Prerequisites What is ethical hacking? Penetration testing methodologies How to use this course

Metasploitable 2 – Lab and Tools Setup

This module will guide you through the installation and configuration of essential tools and software, including virtual machines, and key penetration testing tools such as Kali Linux.

Lessons

VirtualBox Install NatNetwork Setup Metasploitable 2 Setup Kali Linux VM Setup

Metasploitable 2 – Enumeration Methods

In this module, you will explore the critical phase of enumeration in the ethical hacking process. Enumeration involves systematically extracting detailed information about a network, system, or application to identify potential entry points for exploitation.

Lessons

Enumeration Tools Setup nmap rustscan nuclei gobuster

Metasploitable 2 – Initial Foothold

This module focuses on gaining the initial foothold in a target system, a crucial step in the penetration testing lifecycle. You will learn techniques and strategies for exploiting identified vulnerabilities to gain unauthorized access.

Lessons

Exploit-DB and searchsploit Metasploit Python shell upgrade

Metasploitable 2 – Privilege Escalation

This module explores techniques and methodologies used to escalate privileges within a compromised system. You will explore privilege escalation methods, learning how attackers elevate their access rights to gain control over critical system resources.

Lessons

File transfer – Python Server Local enumeration with linPEAS GTFOBins – shell breakout

Conclusion

We will recap the key concepts and techniques covered, emphasizing the practical skills you have acquired in this crash course.

Lessons

Summary

Next Steps

In this module, you will explore the various paths to advance your career in ethical hacking and cybersecurity. We will explore career paths, certifications and application to private programs.

Lessons

Certifications and Additional Training