Study any time, from any device.

Learn Ethical Hacking

The Ethical Hacking skill path helps you master a repeatable, documentable penetration testing methodology. You'll learn how to use the same techniques used by malicious hackers to carry out an ethical hack and assess your organization's vulnerabilities.

12 courses  //   58 videos  //   18 hours of training

Ethical Hacking training

This learning path teaches you the necessary hacking skills to conduct a formal penetration test. As you progress through 12 courses, you’ll build core pentesting skills such as intelligence gathering, reconnaissance, device exploitation, stealth techniques and more. Upon completion, you’ll have the knowledge and skills to carry out a penetration test against an organization to identify weaknesses and potential avenues of attack.

Learning path components

Penetration Testing Cyber Range
Cyber Range
Penetration Testing Cyber Range

Penetration Testing Cyber Range

Gain practical experience and build your real-world pentesting skills through 34 hands-on labs in the Penetration Testing Cyber Range.

34 labs
8 hours of training

Ethical Hacking Process
Course
Ethical Hacking Process

Ethical Hacking Process

Introduce yourself to ethical hacking with this course covering concepts, terminology and the ethical hacking process, step-by-step from passive reconnaissance to post-exploitation and reporting.

7 videos
69 minutes of training

Passive Intelligence Sources, Tools and Techniques
Course
Passive Intelligence Sources, Tools and Techniques

Passive Intelligence Sources, Tools and Techniques

Get to grips with the crucial tools and techniques associated with passive intelligence gathering. Explore intelligence-gathering goals, sources and concepts. Includes vocabulary and definitions.

8 videos
91 minutes of training

Understanding TCP/IP Communications
Course
Understanding TCP/IP Communications

Understanding TCP/IP Communications

In this course, you’ll explore TCP/IP communications specifically for ethical hackers. You’ll take a look at TCP, UDP and ICMP, and examine TCP communications through in-depth demonstrations in Wireshark.

5 videos
55 minutes of training

Network Reconnaissance
Course
Network Reconnaissance

Network Reconnaissance

You can’t launch an attack without some careful reconnaissance. In this course, you’ll look at network reconnaissance goals and concepts, including host discovery, port scanning and service identification. Includes an in-depth demonstration.

4 videos
38 minutes of training

Stealthy Network Reconnaissance
Course
Stealthy Network Reconnaissance

Stealthy Network Reconnaissance

Reconnaissance isn’t much good if you’re spotted while you’re doing it. Explore what it takes to carry out stealthy network reconnaissance with this course covering strategies and stealthy scanning methods.

3 videos
31 minutes of training

Finding and Exploiting Vulnerabilities
Course
Finding and Exploiting Vulnerabilities

Finding and Exploiting Vulnerabilities

A vulnerability is as good as another tool for an ethical hacker. Learn the fundamentals of finding and exploiting vulnerabilities with this course covering exploits, buffer overflows, DLL hijacking and much more.

6 videos
53 minutes of training

Sniffing
Course
Sniffing

Sniffing

There are a number of ways to carry out sniffing, or subtly intercepting useful data. In this course, you’ll explore what it takes to sniff internet traffic, as well as sniffing techniques with packetrecorder, useful tips for sniffing on public Wi-Fi networks and more.

5 videos
62 minutes of training

Cracking Passwords
Course
Cracking Passwords

Cracking Passwords

Cracking a password effectively opens the door into an account or system. Explore the details of cracking passwords, including understanding and capturing Windows passwords and useful tools such as Cain & Abel.

4 videos
37 minutes of training

Covert Channels and IDS Evasion
Course
Covert Channels and IDS Evasion

Covert Channels and IDS Evasion

An intrusion detection system, or IDS, can be a problem for an ethical hacker. In this course, you’ll get to grips with the use of covert channels and evading an intrusion detection system. Includes demonstrations.

4 videos
40 minutes of training

Using Trojans and Backdoors
Course
Using Trojans and Backdoors

Using Trojans and Backdoors

Ethical hackers need to be familiar with hackers’ tricks, and even be able to use them for helpful purposes. With this course, you’ll look at using Trojans and backdoors in an ethical hack, both hiding and detecting backdoor activity. Includes demonstrations.

3 videos
32 minutes of training

Exploit Writing Fundamentals: Basic Buffer Overflow Exploit
Course
Exploit Writing Fundamentals: Basic Buffer Overflow Exploit

Exploit Writing Fundamentals: Basic Buffer Overflow Exploit

Get to grips with the basic buffer overflow exploit in this course. Modules cover understanding memory, initial discovery, fuzzing, vulnerability identification and more. Includes demonstrations.

5 videos
53 minutes of training

Exploiting Common Web Application Vulnerabilities
Course
Exploiting Common Web Application Vulnerabilities

Exploiting Common Web Application Vulnerabilities

Learn to strike at your targets’ weak points with this course on exploiting web application vulnerabilities. This course demonstrates various techniques of exploiting the most common web application flaws such as cross-site scripting (XSS).

4 videos
51 minutes of training

 

What you’ll learn.

  • Penetration testing methodologies
  • Conducting reconnaissance
  • Common attacks, such as overflows and SQL injection
  • Exploiting different types of devices
  • Escalation and stealth techniques
  • And more!

Who is this for?

A firm understanding of the Windows OS, exposure to the Linux OS or other Unix-based OS, and a grasp of the TCP/IP protocols are recommended. This skill path is designed for:

  • Security analysts
  • Security consultants
  • Vulnerability researchers
  • Penetration testers
  • Anyone with a desire to build their hacking skills!

Penetration Testing Cyber Range

This cyber range helps you develop your knowledge of penetration testing and ethical hacking by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of pentesting topics, including abusing protocols, scanning for vulnerabilities, identifying exploits and delivering payloads, and more. You’ll also perform several Capture the Flag (CTF) exercises designed to validate your new pentesting skills.

 

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer

Plans & Pricing

Personal

$299

Annually

Teams

$599 / license

Annually. Volume discounts available. 10 license minimum.