About Lesson
Lesson 1: Planning and Scoping
- Planning and Scoping Compare and contrast governance, risk, and compliance concept
- Explain the importance of scoping and organizational/customer requirements
- Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity
Lesson 2: Information Gathering and Vulnerability Scanning
- Given a scenario, perform passive reconnaissance
- Given a scenario, perform active reconnaissance
- Given a scenario, analyze the results of a reconnaissance exercise
- Given a scenario, perform vulnerability scanning
Lesson 3: Attacks and Exploits
- Given a scenario, research attack vectors and perform network attacks
- Given a scenario, research attack vectors and perform wireless attacks
- Given a scenario, research attack vectors and perform application-based attacks
- Given a scenario, research attack vectors and perform attacks on cloud technologies
- Explain common attacks and vulnerabilities against specialized systems
- Given a scenario, perform a social engineering or physical attack
- Given a scenario, perform post-exploitation techniques
Lesson 4: Reporting and Communication
- Compare and contrast important components of written reports
- Given a scenario, analyze the findings and recommend the appropriate remediation within a report
- Explain the importance of communication during the penetration testing process
- Explain post-report delivery activities
Lesson 5: Tools and Code Analysis
- Tools and Code Analysis
- Given a scenario, analyze a script or code sample for use in a penetration test
- Explain the use cases of the following tools during the phases of a penetration test