Sorry, this is a lesson that requires enrollment. If you are a student, make sure you are logged in.
Lesson 1 Introduction to Penetration Testing: Overview of Penetration Testing Concepts schedule 24 min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
lock Lesson 2 Setting Up a Testing Environment: Tools and Software for Penetration Testing schedule 24 min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
lock Lesson 3 Network Scanning Techniques: Identifying Network Vulnerabilities schedule 24 min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
lock Lesson 4 Exploitation Basics: Exploiting Common Vulnerabilities schedule 25 min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
lock Lesson 5 Reporting and Documentation: Creating Effective Penetration Test Reports schedule 24 min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
lock Lesson 6 Introduction to Threat Hunting: Threat Hunting Fundamentals and Importance schedule min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
lock Lesson 7 Threat Intelligence Gathering: Collecting and Analyzing Threat Data schedule 23 min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
lock Lesson 8 Anomaly Detection Techniques: Identifying Unusual Activity in Systems schedule 25 min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
lock Lesson 9 Using SIEM Tools: Leveraging Security Information and Event Management schedule 24 min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
lock Lesson 10 Cryptography Basics: Fundamental Cryptographic Principles schedule 24 min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
lock Lesson 11 Symmetric and Asymmetric Encryption: Understanding Key Encryption Methods schedule 23 min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
lock Lesson 12 Cryptographic Protocols: Securing Communication Channels schedule 25 min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
lock Lesson 13 Cryptanalysis Techniques: Breaking Ciphers and Encryption schedule 23 min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
lock Lesson 14 Integrating Cryptography in Security Practices: Applying Cryptography to Enhance Security schedule 24 min check_box_outline_blank answer discussion question
check_box_outline_blank complete quiz
|
Certificate Earned To earn the certificate of completion for this course, you must do the following: check_box_outline_blank view each lesson (make sure lessons have checks in the boxes in this column) check_box_outline_blank answer at least one discussion question or student question per lesson where a question is posted ( out of 14 answered) check_box_outline_blank complete each lesson quiz and earn a cumulative score of at least 70% between all lessons (0 out of 140 completed, 0% average score) |
You have one or more errors in this form. After you close this notice, please scroll through this form and correct the specific errors. Error(s):
Your data has been successfully saved.
Are you sure you want to do this?