Introduction to Certified Ethical Hacking and penetration testing Course

This is an overview of the entire certified ethical hacking learning path.

48 minutes

Course description

This course takes you through an introduction of what is covered and how it's covered. Keatron lays out the a foundation for how to approach the content. Learn what is required to properly scope a penetration test. Here we dig into things such as what information to ask customers for; how to ensure you're scoping based on accurate information; and that your scoping exercise will help you provide the customer with a valuable deliverable at the end of the engagement. We then take a deep dive into what is required to become a penetration tester. We talk about pre-reqs, what the course is and is not. We also get into the details of what you will be expected to know for the actual CEH exam. We talk about the test-taking process.


Intro to Certified Ethical Hacking

Video - 00:08:00

An introduction to ethical hacking and pentesting.
Planning and scoping

Video - 00:22:00

Planning and scoping your first pentest.
Welcome to the Certified Ethical Hacking learning path!

Video - 00:02:00

High-level explanation of what's covered in this path.
Linux Fundamentals, part 1

Video - 00:11:00

Here you will learn how to prompt engineer for getting the most out of the Linux command line by using the popular chatbot to teach you how to teach yourself to master these powerful command line utilities.
Linux Fundamentals, part 2

Video - 00:06:00

Dive into some of the more advanced aspects of using the Linux command line for pentesting.

Meet the author

Keatron Evans

Keatron is a highly experienced cybersecurity expert and VP of Portfolio and Product Strategy at Infosec with a wealth of expertise. Keatron is a respected author, instructor and speaker who holds numerous cybersecurity certifications and regularly contributes as a subject matter expert for major media outlets.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All Source-Collection Manager
  • All Source-Collection Requirements Manager
  • Cyber Intel Planner

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust