VTC Ethical Hacking and Penetration Testing Video

Ethical Hacking and Penetration Testing

Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker's eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your network through Ethical Hacking and Penetration Testing. To begin learning today, simply click the links.


Course Overview

Ethical Hacking & Penetration Testing

What is Ethical Hacking?
Types of Ethical Hacking
Responsibilities of the Ethical Hacker
Customer Expectations
Skills of the Hacker
Relevant Laws
Types of Attacks

Methodology Overview

Your Goals
Reconnaissance [passive, active]
Service Enumeration
Vulnerability Assessment
Vulnerability Exploitation
Penetration & Access
Privilege Escalation & Owning the Box
Evading Defenses & Erasing Tracks
Maintaining & Expanding Access

Reconnaissance (Footprinting)

Passive Reconnaissance
Using WHOIS & Other Tools
Active Reconnaissance
Active Reconnaissance Tools & Methods
Putting It All Together
Reconnaissance Demo


Scanning For Hosts
TCP Connection Basics
TCP Scan Types
UDP & ICMP Scanning
Scanning Demonstration using NMAP

Port & Service Enumeration

Identifying Ports & Services
OS Fingerprinting
Popular Scanners

Data Enumeration

Data Enumeration
SNMP Enumeration
DNS Zone Transfers
Windows Null Sessions
NetBIOS Enumeration
Active Directory Extraction

Vulnerability Assessment

Vulnerabilities & Exploits
OS Vulnerabilities
Web Server Vulnerabilities
Database Vulnerabilities
TCP Stack Vulnerabilities
Application Vulnerabilities
Vulnerability Assesment

Penetration/Access/Compromise Pt.1

Penetrating the System Pt.1
Penetrating the System Pt.2
Bypassing Access Controls
Password Cracking Pt.1
Password Cracking Pt.2
Social Engineering

Penetration/Access/Compromise Pt.2

Session Hijacking Pt.1
Session Hijacking Pt.2
Privilege Escalation
Maintaining & Expanding Access
System Compromise

Evading Defenses & Erasing Tracks

Where Your Actions Recorded Pt.1
Where Your Actions Recorded Pt.2
Deleting Log Files & Other Evidence Pt.1
Deleting Log Files & Other Evidence Pt.2
Evading IDS & Firewalls

Introduction to Hacking Techniques Pt.1

Wireless hacking
SQL Injection

Introduction to Hacking Techniques Pt.2

Buffer Overflows
Denial of Service Attacks
Web Hacking

Popular Tools

nmap Pt.1
nmap Pt.2

Penetration Test Demo

Penetration Test Demo Pt.1
Penetration Test Demo Pt.2
Penetration Test Demo Pt.3


About the Authors

EC-Council Certification also known as the International Council of Electronic Commerce Consultants has developed certifications, courseware, classes, and online training covering the diverse arena of Ethical


Recommended Books