Skip to content
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Login
Sign Up
Login
Sign Up
Login
Sign Up
Home
All Programs
Cybersecurity
Testing Your Security
Testing Your Security
Curriculum
7 Sections
31 Lessons
Lifetime
Expand all sections
Collapse all sections
Chapter 1: Introduction to Vulnerability and Penetration Testing
6
1.1
Straightening Out the Terminology
1.2
Recognizing How Malicious Attackers Beget Ethical Hackers
1.3
Understanding the Need to Hack Your Own Systems
1.4
Understanding the Dangers Your Systems Face
1.5
Following the Security Assessment Principles
1.6
Using the Vulnerability and Penetration Testing Process
Chapter 2: Cracking the Hacker Mindset
6
2.1
What You’re Up Against
2.1
Quiz for What You’re Up Against
8 Questions
2.2
Who Breaks into Computer Systems
2.3
Why They Do It
2.4
Planning and Performing Attacks
2.5
Maintaining Anonymity
Chapter 3: Developing Your Security Testing Plan
8
3.1
Establishing Your Goals
3.1
Quiz for Establishing Your Goals
7 Questions
3.2
Determining Which Systems to Test
3.2
Quiz for Determining Which Systems to Test
6 Questions
3.3
Creating Testing Standards
3.3
Quiz for Creating Testing Standards
6 Questions
3.4
Selecting Security Assessment Tools
3.4
Quiz for Selecting Security Assessment Tools
5 Questions
Chapter 4: Hacking Methodology
12
4.1
Setting the Stage for Testing
4.1
Quiz for Setting the Stage for Testing
6 Questions
4.2
Seeing What Others See
4.2
Quiz for Seeing What Others See
5 Questions
4.3
Scanning Systems
4.3
Quiz for Scanning Systems
5 Questions
4.4
Determining What’s Running on Open Ports
4.4
Quiz for Determining What’s Running on Open Ports
6 Questions
4.5
Assessing Vulnerabilities
4.5
Quiz for Assessing Vulnerabilities
6 Questions
4.6
Penetrating the System
4.6
Quiz for Penetrating the System
6 Questions
Chapter 5: Information Gathering
4
5.1
Gathering Public Information
5.1
Quiz for Gathering Public Information
7 Questions
5.2
Mapping the Network
5.2
Quiz for Mapping the Network
5 Questions
Chapter 6: Social Engineering
12
6.1
Introducing Social Engineering
6.1
Quiz for Introducing Social Engineering
6 Questions
6.2
Starting Your Social Engineering Tests
6.2
Quiz for Starting Your Social Engineering Tests
5 Questions
6.3
Knowing Why Attackers Use Social Engineering
6.3
Quiz for Knowing Why Attackers Use Social Engineering
5 Questions
6.4
Understanding the Implications
6.4
Quiz for Understanding the Implications
6 Questions
6.5
Performing Social Engineering Attacks
6.5
Quiz for Performing Social Engineering Attacks
6 Questions
6.6
Social Engineering Countermeasures
6.6
Quiz for Social Engineering Countermeasures
5 Questions
Chapter 7: Physical Security
4
7.1
Identifying Basic Physical Security Vulnerabilities
7.1
Quiz for Identifying Basic Physical Security Vulnerabilities
6 Questions
7.2
Pinpointing Physical Vulnerabilities in Your Office
7.2
Quiz for Pinpointing Physical Vulnerabilities in Your Office
7 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Login
or
Sign Up
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Cybersecurity
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Linkedin
Instagram
Modal title
Main Content