CyberProtex
  • SERVICES
    • Managed Services >
      • Security Operations Center
      • Continuous Monitoring
      • Endpoint Protection
    • Security and Compliance >
      • CMMC Certified Services
      • Assessments
      • Phishing Simulations
      • Incident Response
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Certification Courses
    • CMMC-Summit
    • Cyber Workshops
    • CyberPatriot Competition
    • Summer Camps
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
  • Contact

Ethical Hacking Course

Welcome to the Ethical Hacking Online Course. CyberProtex students get 24/7 access to the demos of how to use some of the hottest tools. There are a multitude of videos to watch at your convenience. If you have any questions about any of the labs, send us an email and we will explain in greater detail.

The CyberProtex "Ethical Hacking" Course follows the Department of Homeland Security (DHS) Workforce Framework. The Framework is the foundation for increasing the size and capability of the US cybersecurity workforce. CyberProtex has partnered with the Department of Homeland Security to implement the Workforce Framework through the National Initiative for Cybersecurity Education (NICE). A listing of modules for the Ethical Hacking course is shown below.


Picture


Introduction to Ethical Hacking

Footprinting and Reconnaissance


Footprinting with Netcraft

Recon with Archive.org


Ethical Hacking Terminology

Google Hacking Reconnaissance


Scanning Networks

Scanning Networks with NMAP


System Hacking

Hacking - Hash Calculator


Default Passwords

Steganography with SNOW


Trojans and Backdoors


Social Engineering

How to create a Virus


System Maintenance


Detecting Trojans with NETSTAT

Detecting Virus' with Sysinternals - TCPView


Covert Channels Using NETCAT

Finding the bad guy with Wireshark


Analyzing Network Traffic with TCP Dump

Introduction to SQL Injection


Advanced SQL Injection

Website Hacking with Parameter Tampering


Cross Site Scripting (XSS)

Hacking Webservers


Directory Traversal Attack

Buffer Overflow Attack in C


Access Control and Identity Management

Threats and Vulnerabilities

TCP/IP and the OSI Model

Business Continuity and Disaster Recovery

PORTS & PROTOCOLS - SIMPLE

PORTS & PROTOCOLS - HARD

Law, Investigations and Ethics

Crypto Bucket

Picture
CyberProtex, LLC - 2012-2023
ContactUs@CyberProtex.com
256-401-7072
Picture
  • SERVICES
    • Managed Services >
      • Security Operations Center
      • Continuous Monitoring
      • Endpoint Protection
    • Security and Compliance >
      • CMMC Certified Services
      • Assessments
      • Phishing Simulations
      • Incident Response
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Certification Courses
    • CMMC-Summit
    • Cyber Workshops
    • CyberPatriot Competition
    • Summer Camps
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
  • Contact