Introduction to Penetration Testing and Ethical Hacking

This course is part of Introduction to Ethical Hacking Specialization

Instructor: Jason Crossland

What you'll learn

  •   Conduct penetration tests using industry-standard methodologies like PTES.
  •   Craft professional penetration testing reports and executive summaries.
  •   
  •   Understand and apply cryptographic principles, including PKI and secret key encryption.
  •   
  •   Master social engineering and analyze cyberattacks with the MITRE ATT&CK Framework.
  •   
  • Skills you'll gain

  •   Vulnerability Assessments
  •   Technical Writing
  •   Cryptography
  •   Security Testing
  •   Penetration Testing
  •   Encryption
  •   Test Tools
  •   Cyber Threat Intelligence
  •   Cybersecurity
  •   Public Key Infrastructure
  •   Ethical Standards And Conduct
  •   Vulnerability Scanning
  •   MITRE ATT&CK Framework
  •   Threat Modeling
  • There are 5 modules in this course

    This Advanced Penetration Testing and Ethical Hacking course offers a deep dive into key cybersecurity concepts, providing you with hands-on experience in areas like penetration testing, cryptography, and social engineering. Through engaging modules, you will learn to conduct penetration tests using industry-standard methodologies, such as the Penetration Testing Execution Standard (PTES), and effectively communicate findings through professional reports and executive summaries. You’ll also gain a solid understanding of cryptographic principles, including public key infrastructure (PKI), while mastering techniques for ethical hacking and countering cryptographic attacks. Additionally, the course covers the art of information gathering and social engineering, equipping you to conduct reconnaissance and craft spear phishing attacks. With practical labs and real-world scenarios, this course will help you build the skills needed to protect mission-critical infrastructures and advance your career in cybersecurity.

    Ideology/Motives/Behaviors (Purpose/Goals)

    Penetration Testing Report & Executive Summary

    Cryptography and PKI

    Information Gathering & Social Engineering

    Explore more from Security

    ©2025  ementorhub.com. All rights reserved