Alert:
Ethical Hacking: Hands on Training Part II is a continuation of Ethical Hacking: Hands on Training Part I. Prior to taking this course, students should have completed an introduction to an ethical hacking or pentesting course. For best results, students should have completed Ethical Hacking: Hands on Training Part I before signing up for part II.
Ethical Hacking: Hands on Training Part II picks up where Part I leaves off. In Part I, students were taught the fundamentals of pentesting while being introduced to the basic skills of a pentester.
Ethical Hacking: Hands On Training Part 2 provides an intermediate level of white, grey, and black hat skills every cybersecurity professional needs to know. Advanced reconnaissance techniques are taught using Shodan, the NMap scripting engine, and an array of hacking tools used by pentesters.
Sections include Web Application Attacks, Wireless Network Attacks, Wireshark Fundamentals, and Python Scripting.
For the best experience in learning to be an ethical hacker or pentester, students should complete the instructors complete series on ethical hacking starting with Ethical Hacking: Hands On Training Part I and proceed on to Part II.
The capstone for this series is the Ethical Hacking Capture the Flag Courses where the student will learn to apply and use all the techniques taught in the series.