CyberProtex
  • SERVICES
    • Managed Services
    • Security and Compliance >
      • CMMC Certified Services
      • Assessments
      • Incident Response
    • Dynamics 365
  • SOFTWARE
    • DevSecOps
    • Application Security
    • Software Products
  • Training
    • Certification Courses
    • CMMC-Summit
    • Cyber Workshops
    • Summer Camps
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
  • Contact

Ethical Hacking Course

Welcome to the Ethical Hacking Online Course. CyberProtex students get 24/7 access to the demos of how to use some of the hottest tools. There are a multitude of videos to watch at your convenience. If you have any questions about any of the labs, send us an email and we will explain in greater detail.

The CyberProtex "Ethical Hacking" Course follows the Department of Homeland Security (DHS) Workforce Framework. The Framework is the foundation for increasing the size and capability of the US cybersecurity workforce. CyberProtex has partnered with the Department of Homeland Security to implement the Workforce Framework through the National Initiative for Cybersecurity Education (NICE). A listing of modules for the Ethical Hacking course is shown below.


Picture


Introduction to Ethical Hacking

Footprinting and Reconnaissance


Footprinting with Netcraft

Recon with Archive.org


Ethical Hacking Terminology

Google Hacking Reconnaissance


Scanning Networks

Scanning Networks with NMAP


System Hacking

Hacking - Hash Calculator


Default Passwords

Steganography with SNOW


Trojans and Backdoors


Social Engineering

How to create a Virus


System Maintenance


Detecting Trojans with NETSTAT

Detecting Virus' with Sysinternals - TCPView


Covert Channels Using NETCAT

Finding the bad guy with Wireshark


Analyzing Network Traffic with TCP Dump

Introduction to SQL Injection


Advanced SQL Injection

Website Hacking with Parameter Tampering


Cross Site Scripting (XSS)

Hacking Webservers


Directory Traversal Attack

Buffer Overflow Attack in C


Access Control and Identity Management

Threats and Vulnerabilities

TCP/IP and the OSI Model

Business Continuity and Disaster Recovery

PORTS & PROTOCOLS - SIMPLE

PORTS & PROTOCOLS - HARD

Law, Investigations and Ethics

Crypto Bucket

Picture
CyberProtex, LLC - 2012-2022
ContactUs@CyberProtex.com
256-401-7072
Picture
  • SERVICES
    • Managed Services
    • Security and Compliance >
      • CMMC Certified Services
      • Assessments
      • Incident Response
    • Dynamics 365
  • SOFTWARE
    • DevSecOps
    • Application Security
    • Software Products
  • Training
    • Certification Courses
    • CMMC-Summit
    • Cyber Workshops
    • Summer Camps
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
  • Contact