Learn Ethical Hacking

The Ethical Hacking skill path helps you master a repeatable, documentable penetration testing methodology. You'll learn how to use the same techniques used by malicious hackers to carry out an ethical hack and assess your organization's vulnerabilities.

12 courses  //   58 videos  //   18 hours of training

Free training week — 700+ on-demand courses and hands-on labs

Ethical Hacking training

This learning path teaches you the necessary hacking skills to conduct a formal penetration test. As you progress through 12 courses, you’ll build core pentesting skills such as intelligence gathering, reconnaissance, device exploitation, stealth techniques and more. Upon completion, you’ll have the knowledge and skills to carry out a penetration test against an organization to identify weaknesses and potential avenues of attack.

Learning path components

Purple Team Web Application Security Project
Assessment
Purple Team Web Application Security Project

Purple Team Web Application Security Project

This project contains three labs focused on understanding, exploiting and mitigating a real vulnerability found in a real web application. You'll intercept web traffic with Burp Suite, perform a local file inclusion attack, practice using a static code analyzer, and learn about mitigation approaches and web application firewalls.

Number of questions: 3

Penetration Testing Cyber Range
Cyber Range
Penetration Testing Cyber Range

Penetration Testing Cyber Range

Gain practical experience and build your real-world pentesting skills through 34 hands-on labs in the Penetration Testing Cyber Range.

34 labs
8 hours of training

Ethical Hacking Process
Course
Ethical Hacking Process

Ethical Hacking Process

Introduce yourself to ethical hacking with this course covering concepts, terminology and the ethical hacking process, step-by-step from passive reconnaissance to post-exploitation and reporting.

7 videos
69 minutes of training

Passive Intelligence Sources, Tools and Techniques
Course
Passive Intelligence Sources, Tools and Techniques

Passive Intelligence Sources, Tools and Techniques

Get to grips with the crucial tools and techniques associated with passive intelligence gathering. Explore intelligence-gathering goals, sources and concepts. Includes vocabulary and definitions.

8 videos
91 minutes of training

Understanding TCP/IP Communications
Course
Understanding TCP/IP Communications

Understanding TCP/IP Communications

In this course, you’ll explore TCP/IP communications specifically for ethical hackers. You’ll take a look at TCP, UDP and ICMP, and examine TCP communications through in-depth demonstrations in Wireshark.

5 videos
55 minutes of training

Network Reconnaissance
Course
Network Reconnaissance

Network Reconnaissance

You can’t launch an attack without some careful reconnaissance. In this course, you’ll look at network reconnaissance goals and concepts, including host discovery, port scanning and service identification. Includes an in-depth demonstration.

4 videos
38 minutes of training

Stealthy Network Reconnaissance
Course
Stealthy Network Reconnaissance

Stealthy Network Reconnaissance

Reconnaissance isn’t much good if you’re spotted while you’re doing it. Explore what it takes to carry out stealthy network reconnaissance with this course covering strategies and stealthy scanning methods.

3 videos
31 minutes of training

Finding and Exploiting Vulnerabilities
Course
Finding and Exploiting Vulnerabilities

Finding and Exploiting Vulnerabilities

A vulnerability is as good as another tool for an ethical hacker. Learn the fundamentals of finding and exploiting vulnerabilities with this course covering exploits, buffer overflows, DLL hijacking and much more.

6 videos
53 minutes of training

Sniffing
Course
Sniffing

Sniffing

There are a number of ways to carry out sniffing, or subtly intercepting useful data. In this course, you’ll explore what it takes to sniff internet traffic, as well as sniffing techniques with packetrecorder, useful tips for sniffing on public Wi-Fi networks and more.

5 videos
62 minutes of training

Cracking Passwords
Course
Cracking Passwords

Cracking Passwords

Cracking a password effectively opens the door into an account or system. Explore the details of cracking passwords, including understanding and capturing Windows passwords and useful tools such as Cain & Abel.

4 videos
37 minutes of training

Covert Channels and IDS Evasion
Course
Covert Channels and IDS Evasion

Covert Channels and IDS Evasion

An intrusion detection system, or IDS, can be a problem for an ethical hacker. In this course, you’ll get to grips with the use of covert channels and evading an intrusion detection system. Includes demonstrations.

4 videos
40 minutes of training

Using Trojans and Backdoors
Course
Using Trojans and Backdoors

Using Trojans and Backdoors

Ethical hackers need to be familiar with hackers’ tricks, and even be able to use them for helpful purposes. With this course, you’ll look at using Trojans and backdoors in an ethical hack, both hiding and detecting backdoor activity. Includes demonstrations.

3 videos
32 minutes of training

Exploit Writing Fundamentals: Basic Buffer Overflow Exploit
Course
Exploit Writing Fundamentals: Basic Buffer Overflow Exploit

Exploit Writing Fundamentals: Basic Buffer Overflow Exploit

Get to grips with the basic buffer overflow exploit in this course. Modules cover understanding memory, initial discovery, fuzzing, vulnerability identification and more. Includes demonstrations.

5 videos
53 minutes of training

Exploiting Common Web Application Vulnerabilities
Course
Exploiting Common Web Application Vulnerabilities

Exploiting Common Web Application Vulnerabilities

Learn to strike at your targets’ weak points with this course on exploiting web application vulnerabilities. This course demonstrates various techniques of exploiting the most common web application flaws such as cross-site scripting (XSS).

4 videos
51 minutes of training

 

What you’ll learn.

  • Penetration testing methodologies
  • Conducting reconnaissance
  • Common attacks, such as overflows and SQL injection
  • Exploiting different types of devices
  • Escalation and stealth techniques
  • And more!

Who is this for?

A firm understanding of the Windows OS, exposure to the Linux OS or other Unix-based OS, and a grasp of the TCP/IP protocols are recommended. This skill path is designed for:

  • Security analysts
  • Security consultants
  • Vulnerability researchers
  • Penetration testers
  • Anyone with a desire to build their hacking skills!

Penetration Testing Cyber Range

This cyber range helps you develop your knowledge of penetration testing and ethical hacking by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of pentesting topics, including abusing protocols, scanning for vulnerabilities, identifying exploits and delivering payloads, and more. You’ll also perform several Capture the Flag (CTF) exercises designed to validate your new pentesting skills.

 

Train on your schedule

Personal
Teams

Infosec Skills subscription

Monthly
Annually
  • 80+ role-based learning paths (Ethical Hacking, Threat Hunting, etc.)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (CISSP, Security+, etc.)
  • Skill assessments
  • Infosec peer community support
  • Create custom learning paths from 100s of courses

Infosec Skills boot camp

Request a quote for pricing

 

Request Quote Browse Boot Camps
  • Exam Pass Guarantee
    If you don’t pass your exam on the first attempt, you'll get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.
  • 100% Satisfaction Guarantee
    If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.
  • Live, instructor-led training (available in-person or online)
  • 90 day extended access to recordings of daily lessons
  • Certification exam voucher
  • Learn by doing with hundreds of additional hands-on courses and labs Infosec Skills Annual

Infosec Skills subscription

Annual

$599 per learner / year

Request Quote Free Team Trial
  • Team administration and reporting
  • Transferable licenses
  • 80+ role-based learning paths (Ethical Hacking, Threat Hunting, etc.)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (CISSP, Security+, etc.)
  • Skill assessments
  • Create and assign custom learning paths
  • Dedicated client success manager

Infosec Skills boot camp

Request a quote for pricing

 

Request Quote Browse Boot Camps
  • Team boot camp administration and reporting
  • Exam Pass Guarantee
    If you don’t pass your exam on the first attempt, you'll get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.
  • 100% Satisfaction Guarantee
    If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.
  • Knowledge Transfer Guarantee
    If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
  • Certification exam vouchers
  • Live, instructor-led training (available onsite, in-person or online)
  • 90 days extended access to recordings of daily lessons
  • Build your team's skills with hundreds of additional hands-on courses and labs

Award-winning training that you can trust

Best Software - Highest Satisfaction

Best Software - Highest Satisfaction

Infosec Skills

Best IT Security-related Training Program

Best IT Security-related Training Program

Infosec Skills

Best Cybersecurity Education Provider & Best Security Education Platform

Best Cybersecurity Education Provider & Best Security Education Platform

Infosec Skills

Most Innovative Product - Cybersecurity Training for Infosec Professionals

Most Innovative Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Global Excellence - Cyber Security Education & Training

Global Excellence - Cyber Security Education & Training

Infosec Skills

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.

LX Labs

SC Media names Infosec Skills Best IT Security Training

See for yourself why Infosec Skills leads the cybersecurity training industry.