Curriculum
- 5 Sections
- 36 Lessons
- 365 Days
Expand all sectionsCollapse all sections
- Domain 1 : Planning and Scoping.4
- 1.1Compare and contrast governance, risk, and compliance concepts.30 Minutes
- 1.2Explain the importance of scoping and organizational/customer requirements Part 1.39 Minutes
- 1.3Demonstrate an ethical hacking mindset by maintaining professionalism and integrity.11 Minutes
- 1.4Explain the importance of scoping and organizational/customer requirements Part 2.17 Minutes
- Domain 2 : Information Gathering and Vulnerability Scanning.7
- 2.1Perform passive reconnaissance Part 1.
- 2.2Perform active reconnaissance Part 1.13 Minutes
- 2.3Analyze the results of a reconnaissance exercise.30 Minutes
- 2.4Perform vulnerability scanning.22 Minutes
- 2.5Perform passive reconnaissance Part 2.29 Minutes
- 2.6Perform passive reconnaissance Part 3.29 Minutes
- 2.7Perform active reconnaissance Part 2.50 Minutes
- Domain 3 : Attacks and Exploits.16
- 3.1Research attack vectors and perform network attacks Part 1.22 Minutes
- 3.2Research attack vectors and perform wireless attacks Part 1.33 Minutes
- 3.3Research attack vectors and perform application-based attacks Part 1.17 Minutes
- 3.4Research attack vectors and perform attacks on cloud technologies Part 1.32 Minutes
- 3.5Explain common attacks and vulnerabilities against specialized systems Part 1.30 Minutes
- 3.6Perform a social engineering or physical attack.31 Minutes
- 3.7Perform post-exploitation techniques Part 1.33 Minutes
- 3.8Research attack vectors and perform wireless attacks Part 2.29 Minutes
- 3.9Research attack vectors and perform application-based attacks Part 2.31 Minutes
- 3.10Research attack vectors and perform application-based attacks Part 3.31 Minutes
- 3.11Research attack vectors and perform attacks on cloud technologies Part 2.23 Minutes
- 3.12Explain common attacks and vulnerabilities against specialized systems Part 2.31 Minutes
- 3.13Explain common attacks and vulnerabilities against specialized systems Part 3.23 Minutes
- 3.14Perform post-exploitation techniques Part 2.21 Minutes
- 3.15Research attack vectors and perform network attacks Part 2.23 Minutes
- 3.16Research attack vectors and perform application-based attacks Part 4.21 Minutes
- Domain 4 : Reporting and Communication.4
- 4.1Analyze the findings and recommend the appropriate remediation within a report.27 Minutes
- 4.2Explain the importance of communication during the penetration testing process.15 Minutes
- 4.3Explain post-report delivery activities.
- 4.4Compare and contrast important components of written reports.23 Minutes
- Domain 5 : Tools and Code Analysis.5
- 5.1Explain the basic concepts of scripting and software development.
- 5.2Analyze a script or code sample for use in a penetration test Part 1.36 Minutes
- 5.3Explain use cases of the following tools during the phases of a penetration test Part 1.31 Minutes
- 5.4Analyze a script or code sample for use in a penetration test Part 2.22 Minutes
- 5.5Explain use cases of the following tools during the phases of a penetration test Part 2.29 Minutes