Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Becoming a Hacker: An Introduction to Ethical Hacking, Penetration Testing, and Bug Hunting

Course Cover
compare button icon
Course Report - Becoming a Hacker: An Introduction to Ethical Hacking, Penetration Testing, and Bug Hunting

Course Report

Find detailed report of this course which helps you make an informed decision on its relevance to your learning needs. Find out the course's popularity among Careervira users and the job roles that would find the course relevant for their upskilling here. You can also find how this course compares against similar courses and much more in the course report.

Course Features

icon

Duration

2 days

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Instructor Paced

icon

Video Content

8 hours

Course Description

You can start your career in ethical hacking or penetration testing by becoming a Hacker. Omar Santos is a best-selling speaker and security author who will lead this two-day intensive training. This training includes live discussions, demonstrations and insight from someone who has been at the forefront of hacking. Expert insights into the methods used to compromise networks will be available. Learn about ethical hacking legal issues and associated risks. The course also covers the many tools and systems that can be used in order to hack into a wireless or wired network.

You don't need any prior experience in ethical hacking or penetration testing. After being introduced to offensive cybersecurity concepts, you will then be guided through a complete penetration testing process from start to finish. Passive and active reconnaissance, vulnerability assessment, exploitation and post-exploitation will all be covered. This two-day course is a good place to start if you are looking for certifications like the Offensive Security Certified Professional Certification (OSCP), CEH Practical, PenTest+ or the GIAC Penetra Tester (GPEN). If you are interested in bug hunting and bug bounty exploration, this live training session can help.

This two-day course can also be helpful to those who are looking for certifications like the Offensive Security Certified Professional Certification (OSCP), CEH Practical, PenTest+ or the GIAC Pennetration Tester(GPEN).

blur
blur

Highlights

blur

Pedagogy

Top 30 Percentile

blur

Course Credibility

Top 20 Percentile

blur

Parameters

cv-icon

Course Credibility

Delivered through O’Reilly a renowned institution in the field, this course offers a comprehensive learning experience.

cv-icon

Pedagogy

This comprehensive course equips you with all major Ethical Hacking skills applicable to your daily life. Personalized teaching ensures one-on-one doubt resolution with faculty, maximizing skill acquisition. These practical skills empower you to confidently apply your knowledge and thrive in various real-life situations.

Course Overview

projects-img

Live Class

projects-img

Human Interaction

projects-img

Personlized Teaching

projects-img

International Faculty

projects-img

Case Based Learning

projects-img

Post Course Interactions

projects-img

Case Studies,Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

Course participants should have a basic understanding of cybersecurity and networking concepts.

What You Will Learn

Learn fundamentals of ethical hacking or security penetration testing

Learn how to build your lab with WebSploit, Kali Linux, and Parrot Security to perform different penetration testing and bug hunting scenarios

Passive and Active Reconnaissance

Open Source Intelligence (OSINT)

Vulnerability Scanning

Web Application Reconnaissance

Introduction to Hacking Web Applications

Introduction to Hacking User Credentials

Web Application Injection Attacks and Hacking Databases

Introduction to Hacking Networking Devices

Fundamentals of Wireless Hacking

Introduction to Buffer Overflows

Introduction to Evasion and Post Exploitation Techniques

Introduction to Social Engineering

How to Maintain Persistence, Pivoting, and Data Exfiltration

Writing Penetration Testing Reports

Course Instructors

Omar Santos

Instructor

Omar Santos is an active member of the cybersecurity community, where he leads several industry-wide initiatives. He is the lead of the DEF CON Red Team Village; the chair of the Common Security Advi...
Course Cover