Course Syllabus Penetration Testing and Ethical Hacking: Brought To You by
Course Syllabus Penetration Testing and Ethical Hacking: Brought To You by
Course Syllabus
Study Resources: The course includes downloadable study materials, including quiz questions
and step by step lab guides in the resources section of the course.
Course Goals: By the end of this course, students should be able to:
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
Labs Used: In this course, the instructor will walk you through both a lab provided by Cybrary,
and several labs that are provided by the instructor which requires setting up a lab environment.
For the labs that are not provided by Cybrary, the instructor will walk you through on how to
download and use the virtual environment. In Module 3, you will see the lab provided by
Cybrary. It is called Certified Ethical Hacker (CEH) and is owned by the vendor Practice Labs.
To practice the exercises that the instructor demonstrates throughout the course, please refer
back to this lab.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
Course Outline
Module 1 | Introduction
Lesson 1.1: Course Introduction (05:56)
Lesson 1.2: CIA Triad, Black, White, and Grey Hats (10:21)
Lesson 1.3: Laws (07:01)
Lesson 1.4: Bonus: VirtualBox and Kali Linux (05:30)
Lesson 1.5: Password Cracking Lab (07:53)
Module 2 | Footprinting
Lesson 2.1: Intro Pre-assessment (05:58)
Lesson 2.2: Footprinting Basics (11:45)
Lesson 2.3: Lab Intro (01:39)
Lesson 2.4: Footprinting NIKTO Lab Instructions (05:56)
Lesson 2.5: Footprinting theHarvester Lab Instructions (06:25)
Lesson 2.6: Footprinting Shodan Lab Instructions (04:48)
Lesson 2.7: Footprinting Google Hacking Lab Instructions (06:50)
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3
Module 5 | Malware
Lesson 5.1: Malware Viruses (08:08)
Lesson 5.2: Malware Worms and Trojans (07:45)
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4
Module 6 | Sniffing
Lesson 6.1: Sniffing (06:24)
Lesson 6.2: Sniffing Lab Intro (13:40)
Lesson 6.3: Sniffing Wireshark Lab Instructions (13:24)
Lesson 6.4: Sniffing MAC Spoof Lab Instructions (07:21)
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
5
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
6
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
7