Learn Ethical Hacking
The Ethical Hacking skill path helps you master a repeatable, documentable penetration testing methodology. You'll learn how to use the same techniques used by malicious hackers to carry out an ethical hack and assess your organization's vulnerabilities.
Ethical Hacking training
This learning path teaches you the necessary hacking skills to conduct a formal penetration test. As you progress through 12 courses, you’ll build core pentesting skills such as intelligence gathering, reconnaissance, device exploitation, stealth techniques and more. Upon completion, you’ll have the knowledge and skills to carry out a penetration test against an organization to identify weaknesses and potential avenues of attack.
Learning path components
Penetration Testing Cyber Range
Ethical Hacking Process
Passive Intelligence Sources, Tools and Techniques
Understanding TCP/IP Communications
Stealthy Network Reconnaissance
Finding and Exploiting Vulnerabilities
Covert Channels and IDS Evasion
Using Trojans and Backdoors
Exploit Writing Fundamentals: Basic Buffer Overflow Exploit
Exploiting Common Web Application Vulnerabilities
What you’ll learn.
- Penetration testing methodologies
- Conducting reconnaissance
- Common attacks, such as overflows and SQL injection
- Exploiting different types of devices
- Escalation and stealth techniques
- And more!
Who is this for?
A firm understanding of the Windows OS, exposure to the Linux OS or other Unix-based OS, and a grasp of the TCP/IP protocols are recommended. This skill path is designed for:
- Security analysts
- Security consultants
- Vulnerability researchers
- Penetration testers
- Anyone with a desire to build their hacking skills!
Penetration Testing Cyber Range
This cyber range helps you develop your knowledge of penetration testing and ethical hacking by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of pentesting topics, including abusing protocols, scanning for vulnerabilities, identifying exploits and delivering payloads, and more. You’ll also perform several Capture the Flag (CTF) exercises designed to validate your new pentesting skills.
You're in good company
Infosec Skills is a very good place for building technical acumen and engineering development knowledge. It enables us to provide training to the entire team on relevant topics.
Romy Ricafort, West Division Senior Director of Sales Engineering
Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I've had.
James Coyle , Senior U.S. Public Sector Channel Sales Engineer
Train on your schedule
- 600+ courses
- 100s of hands-on labs and projects
- 70+ role-based learning paths
- Skill assessments
- Custom learning paths
- Custom certification practice exams
- Cloud-hosted cyber ranges
- Infosec peer community support
Infosec Skills Teams
- All Infosec Skills content for the year
- Team boot camp discounts — online or onsite (not included with subscription)
- Team administration and reporting
- Custom team learning paths
- Transferable licenses
- Dedicated client success manager
Award-winning training that you can trust
Best Software - Highest Satisfaction
Best IT Security-related Training Program
Best Cybersecurity Education Provider & Best Security Education Platform
Most Innovative Product - Cybersecurity Training for Infosec Professionals
Global Excellence - Cyber Security Education & Training
Exceptional learning experiences powered by LX Labs cyber expertise
Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.