O'Reilly logo
live online training icon Live Online training

Introduction to Ethical Hacking and Penetration Testing

Omar Santos

Now is the time to enter the field of cyber security. The number of cyber-attacks continue to rise. Demand for safe and secure data and other concerns mean that companies need professionals to keep their information safe. If you are starting your cyber career, seeking your Certified Ethical Hacking or Offensive Security Certified Professional (OSCP) Certification, or just interested in learning more about cyber security, this two-day training session is a great place to start.

With live discussions, demos, whiteboard instruction and screencasts this training course will introduce you to the basics of ethical hacking or penetration testing. No prior experience is needed. Omar Santos, best-selling security author, speaker and Principal Engineer in the Cisco Product Security Incident Response Team (PSIRT) within Cisco's Security Research and Operations will introduce you to security concepts and then walk you through a complete a penetration test, from beginning to end. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, and exploitation. This course provides step-by-step real-life scenarios. You will see first-hand how an ethical hacker performs initial reconnaissance of a victim and how to assess systems and network security controls security posture.

This training includes live discussions, demos, whiteboard instruction and screencasts. You will benefit from expert insights of the methodologies used to assess and compromise a network. You will also learn about the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired and wireless network and the systems within that network. In this training we will go over several tools like the social engineering tool kit (SET), Metasploit, Maltego, and many more. After that you’ll different best practices on how to write a penetration testing report.

What you'll learn-and how you can apply it

  • Learn fundamentals of ethical hacking or security penetration testing
  • Learn how to use Kali Linux to perform
  • Passive and Active Reconnaissance
  • Vulnerability Scanning
  • Introduction to Hacking Web Applications
  • Introduction to Hacking User Credentials
  • Introduction to Hacking Databases
  • Introduction to Hacking Networking Devices
  • Fundamentals of Wireless Hacking
  • Introduction to Buffer Overflows
  • Introduction to Evasion and Post Exploitation Techniques
  • Introduction to Social Engineering
  • How to Maintain Persistence, Pivoting, and Data Exfiltration
  • Writing Penetration Testing Reports

This training course is for you because...

  • You would like to learn the fundamentals of ethical hacking and penetration testing.
  • You would like to learn about the tools necessary to perform penetration testing as well as also real-life methodologies.
  • You are studying for the Certified Ethical Hacker (CEH) or Offensive Security Certified Professional (OSCP) Certification

Prerequisites

  • Basic understanding of computing concepts (hardware, software, networking, storage, and cloud computing).
  • Basic understanding of cybersecurity.

Materials, downloads, or Supplemental Content needed in advance:

  • No special setup is needed, but downloading Kali Linux from kali.org will be beneficial.

Resources:

Security Penetration Testing The Art of Hacking Series LiveLessons (video)

About your instructor

  • Omar Santos is a Principal Engineer in the Cisco Product Security Incident Response Team (PSIRT) within Cisco's Security Research and Operations. He mentors and leads engineers and incident managers during the investigation and resolution of security vulnerabilities in all Cisco products, including cloud services. Omar has been working with information technology and cyber security since the mid-1990s. Omar has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies and the U.S. government. He is an active member of the security community, where he leads several industry-wide initiatives and standard bodies. Omar is often delivering technical presentations at many conferences and he is the author of over 15 books and video courses.

Schedule

The timeframes are only estimates and may vary according to how the class is progressing

DAY ONE

  • Overview of Ethical Hacking and Penetration Testing (25 minutes)
  • Kali Linux (25 minutes)
  • Break (10 minutes)
  • Passive and Active Reconnaissance  (30 minutes)
  • Introduction to Hacking Web Applications  (25 minutes)
  • Break (10 minutes)
  • Introduction to Hacking User Credentials  (25 minutes)
  • Introduction to Hacking Databases  (30 minutes)

DAY TWO

  • Introduction to Hacking Networking Devices (25 minutes)
  • Fundamentals of Wireless Hacking  (30 minutes)
  • Break (10 minutes)
  • Introduction to Buffer Overflows  (25 minutes)
  • Fundamentals of Evasion and Post Exploitation Techniques (25 minutes)
  • Break (10 minutes)
  • Introduction to Social Engineering (30 minutes)
  • How to Write Penetration Testing Reports (25 minutes)