Intermediate Ethical Hacking - Hands-on Training
Booking Options 
Choose Your Exam Board 
-
Overview
What you will learn from this course?
- Gain comprehensive knowledge about ethical hacking
- Understand the core competencies and principles of ethical hacking
- Explore the various areas of ethical hacking
- Know how to apply the skills you acquired from this course in a real-life context
- Become a confident and expert ethical hacker
Course Highlights
- Course Type: Self-paced online course
- Duration: 1 to 2 hours
- Tutor Support: Full tutor support is included
- Customer Support: 24/7 customer support is available
Intermediate Ethical Hacking – Hands-on Training Course
Master the skills you need to propel your career forward in ethical hacking. This course will equip you with the essential knowledge and skillset that will make you a confident ethical hacker and take your career to the next level. This comprehensive intermediate ethical hacking course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this intermediate ethical hacking course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career.
This Intermediate Ethical Hacking – Hands-On Training course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.
This comprehensive course will teach you the theory of effective ethical hacking practice and equip you with the essential skills, confidence and competence to assist you in the ethical hacking industry. You’ll gain a solid understanding of the core competencies required to drive a successful career in ethical hacking. This course is designed by industry experts, so you’ll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for ethical hacker or for people who are aspiring to specialise in ethical hacking.This Intermediate Ethical Hacking – Hands-On Training course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual and is not an accredited qualification.
Enrol in this intermediate ethical hacking course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates.
Who is this Course for?
This comprehensive intermediate ethical hacking course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this ethical hacking can also take this course.
Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector.
Entry Requirements
This intermediate ethical hacking course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection.
Assessment
This intermediate ethical hacking course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%.
Advance Your Career
This intermediate ethical hacking course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume.
Study Plex Subscription
Study plex also provides a subscription option that allows you unlimited access to more than 700+ CPD courses for learning. You only need to spend £79 to take advantage of this fantastic offer, and you’ll get an unlimited subscription for a full year. Additionally, you can cancel your membership from your account at any time by getting in touch with our friendly and devoted customer care team.
Visit our subscriptions page for more details if you’re interested.
Why you should train with Study Plex?
At Study Plex, you will have the chance to build social, technical and personal skills through a combination of extensive subjects tailored according to your interest. Along with receiving comprehensive knowledge and transferable skills, there are even more reasons o be involved with us, which include:
- Incredible Customer Support: We offer active customer service in the form of live chat, which you can access 24/7
- Expert Tutor Support: You’ll have access to our devoted and dedicated tutor support with all of our courses whenever you need it.
- Price Justified by Quality: We ensure that you will have the best experience possible for the price you are paying for the course.
- Money-back Guarantee: We provide a money-back guarantee if you are not satisfied with the course’s quality. There is a 14-day time limit on this option (according to the terms and conditions).
- Instalment Facility: If your course costs more than £50, you can pay in three instalments using the instalment option.
- Satisfaction Guarantee: Our courses are designed to meet your demands and expectations by all means.
-
Curriculum
This comprehensive course is designed by industry experts; this course will provide you with the skills and knowledge you need to succeed. Not only will it make you more lucrative to potential employers, but it will also give you the confidence to apply for that dream job.
This course is divided into bite-sized modules to make it easy to follow. The modules of this course cover all essential areas to provide you with the appropriate skills and industry knowledge to take your career to the next level. Whether you are travelling around the world or juggling work and family, this course can be completed anytime, anywhere. This flexibility enables you to learn at your own pace, fitting your studies around your current lifestyle.
Course Curriculum
Course Overview Course Overview 00:05:00 Virtual Lab Build Video – Downloading ISO and OVA Files for VirtualBox 00:08:00 Video and Lab -Creating a Virtual install of Kali using VirtualBox 00:12:00 Video and lab – Create a virtual install of Metasploitable2 00:10:00 Video and Lab – Creating Windows 7 Pro Target Machine Using VirtualBox 00:07:00 Video and Lab – Creating Windows 10 Target Machine Using VirtualBox 00:08:00 Creating Windows 10 Target Machine Using VirtualBox 00:08:00 Installing the VirtualBox Extension Pack 00:02:00 NMap Installing the WebMap-Nmap Dashboard 00:12:00 Automated Recon/Enumeration Using nmapAutomator 00:10:00 Enumerating a Windows 10 Target Creating a Vulnerable Windows 10 Target 00:04:00 Reverse Shells, Privilege Escalation and Persistent Backdoors. Create a Windows Reverse Shell Using the PowerShell 00:08:00 Create a Reverse Shell Using Command Injection 00:06:00 Create a Reverse Shell Using a File Upload 00:08:00 Launch an Automated Meterpreter Session 00:13:00 Upgrade a Dumb Terminal to Fully Functional BASH Shell 00:09:00 Windows 7 Privilege Escalation Using UAC Bypass 00:05:00 Creating a Persistent Backdoor Using a Persistent Service 00:14:00 PowerShell Empire Create Virtual Install of Server 2016 Full GUI Using VirtualBox 00:12:00 00:09:00 Installing PowerShell Empire StarKiller On Kali Linux 00:05:00 Enumerating Active Directory 00:15:00 Post-Exploitation of Windows Using PowerShell Empire 00:19:00 Post Exploitation of Microsoft Windows Advanced Password Hacking with Metasploit 00:13:00 Post-Exploitation of Microsoft Windows 00:13:00 Brute Force the SMB Password on a Windows Server 00:10:00 Enumerating Active Directory Using RPCClient 00:16:00 Dumping Wi-Fi Credentials Using netsh 00:04:00 Practical Pentesting Labs Heartbleed OpenSSL Exploit Vulnerability 00:17:00 Performing an RDP Brute Force Attack 00:14:00 Exploiting Active Directory using LLMNR/NBT-NS Poisoning 00:11:00 Accessing Kali Across the WAN with NGROK 00:15:00 Pentesting with Netcat 00:12:00 Enumerate DNS Records Using DNSRecon 00:12:00 Auditing Wireless Networks Installing a Wireless Adapter in Kali 00:09:00 Hacking a Wireless Network Using Kali Linux 00:14:00 Wireless Deauthentication Attack 00:06:00 PMKID Client-less Wireless Attack Using Bettercap 00:10:00 Wireshark Overview of Wireshark 3.2 00:10:00 Wireshark Capture Options 00:07:00 Wireshark Toolbar Icons 00:03:00 Capturing Wireless Traffic Using Wireshark 00:05:00 Capturing a 3-way TCP Handshake Using Wireshark 00:05:00 Web App Penetration Testing Creating a virtual install of OWASP 00:05:00 Setting Up Burp Suite 00:09:00 Attack Web Apps with Burp Suite Using SQL Injection 00:11:00 OS Command Injection Using Commix 3.2x 00:16:00 Web Application Firewall Detection Using WAFW00F 00:04:00 Exploit Vulnerable Web Applications Using Command Injection 00:09:00 Exploit Vulnerable Web Applications Using Command Injection 00:09:00 Using Banner Grabbing to Aid in Reconnaissance 00:10:00 Anonymity - Remaining Anonymous While Pentesting Anonymize Kali Using Whonix 00:10:00 CTF - SQL Injection to Shell Walkthrough Lab Preparation for CTF SQL Injection to Shell 00:04:00 CTF Walkthrough for SQL Injection to Shell 00:13:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00 -
Accreditation
-
Certification
-
Reviews
-
FAQ
Ask a Question
✶
What you will learn from this course?
- Gain comprehensive knowledge about ethical hacking
- Understand the core competencies and principles of ethical hacking
- Explore the various areas of ethical hacking
- Know how to apply the skills you acquired from this course in a real-life context
- Become a confident and expert ethical hacker
Course Highlights
- Course Type: Self-paced online course
- Duration: 1 to 2 hours
- Tutor Support: Full tutor support is included
- Customer Support: 24/7 customer support is available
Intermediate Ethical Hacking – Hands-on Training Course
Master the skills you need to propel your career forward in ethical hacking. This course will equip you with the essential knowledge and skillset that will make you a confident ethical hacker and take your career to the next level. This comprehensive intermediate ethical hacking course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this intermediate ethical hacking course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career.
This Intermediate Ethical Hacking – Hands-On Training course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.
This comprehensive course will teach you the theory of effective ethical hacking practice and equip you with the essential skills, confidence and competence to assist you in the ethical hacking industry. You’ll gain a solid understanding of the core competencies required to drive a successful career in ethical hacking. This course is designed by industry experts, so you’ll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for ethical hacker or for people who are aspiring to specialise in ethical hacking.This Intermediate Ethical Hacking – Hands-On Training course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual and is not an accredited qualification.
Enrol in this intermediate ethical hacking course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates.
Who is this Course for?
This comprehensive intermediate ethical hacking course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this ethical hacking can also take this course.
Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector.
Entry Requirements
This intermediate ethical hacking course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection.
Assessment
This intermediate ethical hacking course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%.
Advance Your Career
This intermediate ethical hacking course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume.
Study Plex Subscription
Study plex also provides a subscription option that allows you unlimited access to more than 700+ CPD courses for learning. You only need to spend £79 to take advantage of this fantastic offer, and you’ll get an unlimited subscription for a full year. Additionally, you can cancel your membership from your account at any time by getting in touch with our friendly and devoted customer care team.
Visit our subscriptions page for more details if you’re interested.
Why you should train with Study Plex?
At Study Plex, you will have the chance to build social, technical and personal skills through a combination of extensive subjects tailored according to your interest. Along with receiving comprehensive knowledge and transferable skills, there are even more reasons o be involved with us, which include:
- Incredible Customer Support: We offer active customer service in the form of live chat, which you can access 24/7
- Expert Tutor Support: You’ll have access to our devoted and dedicated tutor support with all of our courses whenever you need it.
- Price Justified by Quality: We ensure that you will have the best experience possible for the price you are paying for the course.
- Money-back Guarantee: We provide a money-back guarantee if you are not satisfied with the course’s quality. There is a 14-day time limit on this option (according to the terms and conditions).
- Instalment Facility: If your course costs more than £50, you can pay in three instalments using the instalment option.
- Satisfaction Guarantee: Our courses are designed to meet your demands and expectations by all means.
This comprehensive course is designed by industry experts; this course will provide you with the skills and knowledge you need to succeed. Not only will it make you more lucrative to potential employers, but it will also give you the confidence to apply for that dream job.
This course is divided into bite-sized modules to make it easy to follow. The modules of this course cover all essential areas to provide you with the appropriate skills and industry knowledge to take your career to the next level. Whether you are travelling around the world or juggling work and family, this course can be completed anytime, anywhere. This flexibility enables you to learn at your own pace, fitting your studies around your current lifestyle.
Course Curriculum
Course Overview | |||
Course Overview | 00:05:00 | ||
Virtual Lab Build | |||
Video – Downloading ISO and OVA Files for VirtualBox | 00:08:00 | ||
Video and Lab -Creating a Virtual install of Kali using VirtualBox | 00:12:00 | ||
Video and lab – Create a virtual install of Metasploitable2 | 00:10:00 | ||
Video and Lab – Creating Windows 7 Pro Target Machine Using VirtualBox | 00:07:00 | ||
Video and Lab – Creating Windows 10 Target Machine Using VirtualBox | 00:08:00 | ||
Creating Windows 10 Target Machine Using VirtualBox | 00:08:00 | ||
Installing the VirtualBox Extension Pack | 00:02:00 | ||
NMap | |||
Installing the WebMap-Nmap Dashboard | 00:12:00 | ||
Automated Recon/Enumeration Using nmapAutomator | 00:10:00 | ||
Enumerating a Windows 10 Target | |||
Creating a Vulnerable Windows 10 Target | 00:04:00 | ||
Reverse Shells, Privilege Escalation and Persistent Backdoors. | |||
Create a Windows Reverse Shell Using the PowerShell | 00:08:00 | ||
Create a Reverse Shell Using Command Injection | 00:06:00 | ||
Create a Reverse Shell Using a File Upload | 00:08:00 | ||
Launch an Automated Meterpreter Session | 00:13:00 | ||
Upgrade a Dumb Terminal to Fully Functional BASH Shell | 00:09:00 | ||
Windows 7 Privilege Escalation Using UAC Bypass | 00:05:00 | ||
Creating a Persistent Backdoor Using a Persistent Service | 00:14:00 | ||
PowerShell Empire | |||
Create Virtual Install of Server 2016 Full GUI Using VirtualBox | 00:12:00 | ||
00:09:00 | |||
Installing PowerShell Empire StarKiller On Kali Linux | 00:05:00 | ||
Enumerating Active Directory | 00:15:00 | ||
Post-Exploitation of Windows Using PowerShell Empire | 00:19:00 | ||
Post Exploitation of Microsoft Windows | |||
Advanced Password Hacking with Metasploit | 00:13:00 | ||
Post-Exploitation of Microsoft Windows | 00:13:00 | ||
Brute Force the SMB Password on a Windows Server | 00:10:00 | ||
Enumerating Active Directory Using RPCClient | 00:16:00 | ||
Dumping Wi-Fi Credentials Using netsh | 00:04:00 | ||
Practical Pentesting Labs | |||
Heartbleed OpenSSL Exploit Vulnerability | 00:17:00 | ||
Performing an RDP Brute Force Attack | 00:14:00 | ||
Exploiting Active Directory using LLMNR/NBT-NS Poisoning | 00:11:00 | ||
Accessing Kali Across the WAN with NGROK | 00:15:00 | ||
Pentesting with Netcat | 00:12:00 | ||
Enumerate DNS Records Using DNSRecon | 00:12:00 | ||
Auditing Wireless Networks | |||
Installing a Wireless Adapter in Kali | 00:09:00 | ||
Hacking a Wireless Network Using Kali Linux | 00:14:00 | ||
Wireless Deauthentication Attack | 00:06:00 | ||
PMKID Client-less Wireless Attack Using Bettercap | 00:10:00 | ||
Wireshark | |||
Overview of Wireshark 3.2 | 00:10:00 | ||
Wireshark Capture Options | 00:07:00 | ||
Wireshark Toolbar Icons | 00:03:00 | ||
Capturing Wireless Traffic Using Wireshark | 00:05:00 | ||
Capturing a 3-way TCP Handshake Using Wireshark | 00:05:00 | ||
Web App Penetration Testing | |||
Creating a virtual install of OWASP | 00:05:00 | ||
Setting Up Burp Suite | 00:09:00 | ||
Attack Web Apps with Burp Suite Using SQL Injection | 00:11:00 | ||
OS Command Injection Using Commix 3.2x | 00:16:00 | ||
Web Application Firewall Detection Using WAFW00F | 00:04:00 | ||
Exploit Vulnerable Web Applications Using Command Injection | 00:09:00 | ||
Exploit Vulnerable Web Applications Using Command Injection | 00:09:00 | ||
Using Banner Grabbing to Aid in Reconnaissance | 00:10:00 | ||
Anonymity - Remaining Anonymous While Pentesting | |||
Anonymize Kali Using Whonix | 00:10:00 | ||
CTF - SQL Injection to Shell Walkthrough | |||
Lab Preparation for CTF SQL Injection to Shell | 00:04:00 | ||
CTF Walkthrough for SQL Injection to Shell | 00:13:00 | ||
Obtain Your Certificate | |||
Order Your Certificate of Achievement | 00:00:00 | ||
Get Your Insurance Now | |||
Get Your Insurance Now | 00:00:00 | ||
Feedback | |||
Feedback | 00:00:00 |