Intermediate Ethical Hacking Training
The Intermediate Ethical Hacking Training is the best way for you to gain deep insight and knowledge of this topic. You will learn from industry experts and obtain an accredited certificate after completing the course. Enrol now for a limited-time discounted price.
Like all the courses of One Education, this Intermediate Ethical Hacking Training is designed with the utmost attention and thorough research. All the topics are broken down into easy to understand bite-sized modules that help our learners to understand each lesson very easily.
We don’t just provide courses at One Education; we provide a rich learning experience. After purchasing a course from One Education, you get complete 1-year access with tutor support.
Our expert instructors are always available to answer all your questions and make your learning experience exquisite.
After completing the Intermediate Ethical Hacking Training, you will instantly get an e-certificate that will help you get jobs in the relevant field and will enrich your CV.
If you want to learn about this topic and achieve certifications, you should consider this Intermediate Ethical Hacking Training from One Education.
There are no hidden fees or exam charges. We are very upfront and clear about all the costs of the course.
The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.
You are taught through a combination of
- Video lessons
- Online study materials
Will I receive a certificate of completion?
Upon successful completion, you will qualify for the UK and internationally-recognised certification and you can choose to make your achievement formal by obtaining your PDF Certificate at a cost of £9 and Hard Copy Certificate for £15.
Why study this course
Whether you’re an existing practitioner or aspiring professional, this course will enhance your expertise and boost your CV with key skills and an accredited qualification attesting to your knowledge.
The Intermediate Ethical Hacking Training is open to all, with no formal entry requirements. All you need is a passion for learning, a good understanding of the English language, numeracy and IT, and to be over the age of 16.
|Unit 01: Course Overview|
|Unit 02: Virtual Lab Build|
|Lab – Create a Virtual Install Kali Image Using VirtualBox||00:07:00|
|lab – Create a virtual install of Metasploitable2||00:10:00|
|Lab – Create a Virtual Install of Windows 7 Pro||00:06:00|
|Video – Installing the VirtualBox Extension Pack||00:02:00|
|Unit 03: Anonymity - Remaining Anonymous While Pentesting|
|Lab – Anonymize Kali Using Whonix||00:10:00|
|Unit 04: NMap|
|Lab – Installing the WebMap-Nmap Dashboard||00:55:00|
|Lab – Automated Recon/Enumeration Using nmapAutomator||00:10:00|
|Unit 05: Reverse Shells|
|Lab – Create a Reverse Shell Using Command Injection||00:20:00|
|Video Lab – Create a Reverse Shell Using a File Upload||00:09:00|
|Lab – Upgrade a Dumb Terminal to Fully Functional BASH Shell||00:40:00|
|Unit 06: Creating a Persistent Backdoor|
|Lab – Spawn a Meterpreter session With Windows 7 Pro||01:15:00|
|Lab – Service Persistence||01:10:00|
|Unit 07: Auditing Wireless Networks|
|Lab – Installing a Wireless Adapter in Kali||00:35:00|
|Lab – Hacking a Wireless Network Using Kali Linux||00:35:00|
|Lab – Wireless Deauthentication Attack||00:07:00|
|Lab – PMKID Client-less Wireless Attack Using Bettercap||00:35:00|
|Unit 08: Wireshark|
|Video – Overview of Wireshark 3.2||00:11:00|
|Video – Wireshark Capture Options||00:07:00|
|Video – Wireshark Toolbar Icons||00:04:00|
|Lab – Capturing a 3-way TCP Handshake Using Wireshark||00:15:00|
|Video – Capturing Wireless Traffic Using Wireshark||00:05:00|
|Unit 09: Web App Penetration Testing|
|Lab – Creating a Virtual Install of OWASP Using VirtualBox||00:25:00|
|Video – Setting Up Burp Suite||00:09:00|
|Lab – Attack Web Apps with Burp Suite Using SQL Injection||00:50:00|
|Video – Web Application Firewall Detection Using WAFW00F||00:05:00|
|Lab – Exploit Vulnerable Web Applications Using Command Injection||00:25:00|
|Lab – Using Banner Grabbing to Aid in Reconnaissance||00:10:00|
|Unit 10: CTF - SQL Injection to Shell Walkthrough|
|lab – Lab preparation||00:05:00|
|CTF Walkthrough – SQL Injection to Shell||00:13:00|
No Reviews found for this course.