Study any time, from any device.

Learn Ethical Hacking

The Ethical Hacking skill path helps you master a repeatable, documentable penetration testing methodology. You'll learn how to use the same techniques used by malicious hackers to carry out an ethical hack and assess your organization's vulnerabilities.

11 courses  //   39 videos  //   15 hours of training

Ethical Hacking training

This learning path teaches you the necessary hacking skills to conduct a formal penetration test. As you progress through 11 courses, you’ll build core pentesting skills such as intelligence gathering, reconnaissance, device exploitation, stealth techniques and more. Upon completion, you’ll have the knowledge and skills to carry out a penetration test against an organization to identify weaknesses and potential avenues of attack.

Learning path components

Penetration Testing Cyber Range
Cyber Range
Penetration Testing Cyber Range

Penetration Testing Cyber Range

Gain practical experience and build your real-world pentesting skills through 34 hands-on labs in the Penetration Testing Cyber Range.

34 labs
8 hours of training

Introduction to Ethical Hacking
Course
Introduction to Ethical Hacking

Introduction to Ethical Hacking

Discover the basics of ethical hacking in this introductory course covering penetration testing methodologies and tools as well as an introduction to Linux.

2 videos
39 minutes of training

Passive Intelligence Gathering
Course
Passive Intelligence Gathering

Passive Intelligence Gathering

Learn about passive intelligence gathering, one of the key aspects of ethical hacking, in this four-video overview course.

4 videos
76 minutes of training

Network Recon
Course
Network Recon

Network Recon

Learn the process of network reconnaissance and how it relates to ethical hacking, including tools, scan types and identifying vulnerable systems.

4 videos
39 minutes of training

Fundamentals of Exploitation
Course
Fundamentals of Exploitation

Fundamentals of Exploitation

Build your knowledge of exploitation, including types of exploits, overflows and privilege escalation, as well as tools and techniques related to ethical hacking.

7 videos
49 minutes of training

Breaking Password Security
Course
Breaking Password Security

Breaking Password Security

Learn about breaking passwords, including different attack types and popular tools as well as tricks to retrieving passwords from Windows systems.

3 videos
28 minutes of training

Attacking Web Servers
Course
Attacking Web Servers

Attacking Web Servers

Learn about attacking web servers, including gathering server information and using tools to carry out ethical hacks such as cross-site scripting and SQL injection.

3 videos
36 minutes of training

Post-Exploitation Techniques
Course
Post-Exploitation Techniques

Post-Exploitation Techniques

Learn about taking advantage of a system after it's been compromised, including leveraging post-exploitation techniques, using malware and exfiltrating data.

6 videos
44 minutes of training

Attacking Wireless Networks
Course
Attacking Wireless Networks

Attacking Wireless Networks

Learn about exploiting wireless networks, including protocols, Wi-Fi authentication and weak points, as well as an overview of mobile devices.

2 videos
22 minutes of training

IoT Security
Course
IoT Security

IoT Security

Learn about the Internet of Things (IoT) and how ethical hackers can exploit the growing number of internet-connected devices.

2 videos
11 minutes of training

Covering Tracks
Course
Covering Tracks

Covering Tracks

Get insight into how cybercriminals and ethical hackers cover their tracks by removing evidence and any traces of their intrusion.

3 videos
12 minutes of training

Cryptography Fundamentals
Course
Cryptography Fundamentals

Cryptography Fundamentals

Explore how cryptography relates to ethical hacking, including key cryptography concepts, cryptography uses and cryptanalytic attacks.

3 videos
38 minutes of training

 

What you’ll learn.

  • Penetration testing methodologies
  • Conducting reconnaissance
  • Common attacks, such as overflows and SQL injection
  • Exploiting different types of devices
  • Escalation and stealth techniques
  • And more!

Who is this for?

A firm understanding of the Windows OS, exposure to the Linux OS or other Unix-based OS, and a grasp of the TCP/IP protocols are recommended. This skill path is designed for:

  • Security analysts
  • Security consultants
  • Vulnerability researchers
  • Penetration testers
  • Anyone with a desire to build their hacking skills!

Penetration Testing Cyber Range

This cyber range helps you develop your knowledge of penetration testing and ethical hacking by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of pentesting topics, including abusing protocols, scanning for vulnerabilities, identifying exploits and delivering payloads, and more. You’ll also perform several Capture the Flag (CTF) exercises designed to validate your new pentesting skills.

 

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer