Course
Cisco Certificate in Ethical Hacking
Overview
Course Description 📄
Welcome to the Cisco Certificate in Ethical Hacking course by Pennant Education!
Prerequisite
Certified Support Technician (CCST) – Cybersecurity
The “Cisco Certificate in Ethical Hacking course prepares learners to become skilled in identifying and mitigating cybersecurity vulnerabilities using ethical hacking techniques. The course covers essential topics such as network scanning, penetration testing, system vulnerabilities, and the use of ethical hacking tools, offering a comprehensive foundation for those aiming to advance their careers in cybersecurity or pursue specialized ethical hacking certifications.
Learning Formats 🎓
Develop a thorough understanding of ethical hacking principles, including penetration testing methodologies, vulnerability assessments, and system exploitation techniques.
Acquire the skills to identify, analyze, and mitigate security vulnerabilities in networks, systems, and applications using advanced ethical hacking techniques.
Prepare for professional roles in ethical hacking and cybersecurity, equipping learners with the necessary expertise for industry certifications and advanced responsibilities.
Foster a proactive approach to cybersecurity, enabling learners to anticipate security challenges and implement effective preventive measures.
Key Features
Course Highlights ✨
Conceptual Clarity
Master ethical hacking concepts such as penetration testing, vulnerability scanning, and threat analysis to enhance IT security.
Skill Enhancement
Utilize industry-standard ethical hacking tools and methodologies effectively to identify and resolve security vulnerabilities.
Innovative Application
Conduct comprehensive cybersecurity assessments that contribute to the resilience and robustness of IT infrastructure against potential threats.
Problem-Solving Proficiency
Develop strategic solutions to complex cybersecurity problems, ensuring the security and integrity of information systems.
Program
Roadmap
- Understanding Ethical Hacking and Penetration TestingApplication Attacks
- Exploring Penetration Testing Methodologies
- Building Your Own Lab
- Comparing and Contrasting Governance, Risk, and Compliance Concepts
- Explaining the Importance of Scoping and Organizational or Customer Requirements
- Demonstrating an Ethical Hacking Mindset by Maintaining Professionalism and Integrity
- Performing Passive Reconnaissance
- Performing Active Reconnaissance
- Understanding the Art of Performing Vulnerability Scans
- Understanding How to Analyze Vulnerability Scan Results
- Pretexting for an Approach and Impersonation
- Social Engineering Attacks
- Physical Attacks
- Social Engineering Tools
- Methods of Influence
- Exploiting Network-Based Vulnerabilities
- Exploiting Wireless Vulnerabilities
- Overview of Web Application-Based Attacks
- How to Build Your Own Web Application Lab
- Understanding Business Logic Flaws
- Understanding Injection-Based Vulnerabilities
- Exploiting Authentication-Based Vulnerabilities
- Understanding Cross-Site Scripting (XSS)
- Understanding Cross-Site Request
- Understanding Clickjacking
- Exploiting Security Misconfigurations
- Exploiting File Inclusion Vulnerabilities
- Exploiting Insecure Code Practices
- Research Attacks Vectors and Performing Attacks on Cloud Technologies
- Explaining Common Attacks and Vulnerabilities Against Specialized System
- Creating a Foothold and Maintaining Persistence After Compromising a System
- Understanding How to Perform Lateral Movement, Detection Avoidance, and Enumeration
- Comparing and Contrasting Important Component of Written Reports
- Analyzing the Findings and Recommending the Appropriate Remediation Within a Report
- Explaining the Importance of Communication During the Penetration Testing Process
- Explaining Post-Report Delivery Activities
- Understanding the Basic Concepts of Scripting and Software Development
- Understanding the Different Use Cases of Penetration Testing Tools and Analyzing Exploit Code
Interested in Courses? Get in Touch!
Department Contact
- NYC
- (+62)21-2002-2012
- hello@yourdomain.tld
- Mon - Fri : 09.00-17.00