Ethical Hacking

The Ethical Hacking skills path helps you master a repeatable, documentable penetration testing methodology. You'll learn how to use the same techniques used by malicious hackers to carry out an ethical hack and assess your organization's vulnerabilities.

Course

Introduction to Ethical Hacking

38 minutes

Discover the basics of ethical hacking in this introductory course covering penetration testing methodologies and tools as well as an introduction to Linux.

Course

Passive Intelligence Gathering

1 hour, 17 minutes

Learn about passive intelligence gathering, one of the key aspects of ethical hacking, in this four-video overview course.

Course

Network Recon

39 minutes

Learn the process of network reconnaissance and how it relates to ethical hacking, including tools, scan types and identifying vulnerable systems.

Course

Fundamentals of Exploitation

47 minutes

Build your knowledge of exploitation, including types of exploits, overflows and privilege escalation, as well as tools and techniques related to ethical hacking.

Course

Breaking Password Security

27 minutes

Learn about breaking passwords, including different attack types and popular tools as well as tricks to retrieving passwords from Windows systems.

Course

Attacking Web Servers and Applications

35 minutes

Learn about attacking web servers and applications, including gathering server information and using tools to carry out ethical hacks such as cross-site scripting and SQL injection.

Course

Post-Exploitation Techniques

43 minutes

Learn about taking advantage of a system after it's been compromised, including leveraging post-exploitation techniques, using malware and exfiltrating data.

Course

Attacking Wireless Networks

21 minutes

Learn about exploiting wireless networks, including protocols and weak points as well as an overview of mobile devices.

Course

IoT Security

11 minutes

Learn about the Internet of Things (IoT) and how ethical hackers can exploit the growing number of internet-connected devices.

Course

Covering Tracks

11 minutes

Get insight into how cybercriminals and ethical hackers cover their tracks by removing evidence and any traces of their intrusion.

Course

Cryptography Fundamentals

38 minutes

Explore how cryptography relates to ethical hacking, including key cryptography concepts, cryptography uses and cryptanalytic attacks.