Introduction to Ethical Hacking Tools

Developed with QA
OverviewStepsAuthor
QA
This content is developed in partnership with QA
DifficultyIntermediate
AVG Duration8h
Students754
Ratings
4.6/5
starstarstarstarstar-half
Content
109315

Description

This learning path has been designed to introduce you to a number of different ethical hacking tools, covering:

  • Nmap network scanner
  • Netcat network utility
  • Metasploit vulnerability exploitation tool
  • Nikto web app scanner
  • SQLmap SQL injection tool
  • Burpsuite web app proxy
  • Dirbuster vulnerability scanner
  • Droopescan vulnerability exploitation tool

You will be guided through this learning path with a variety of video tutorials, in addition to hands-on labs and PDF resources 

Intended Audience

If you are looking to become an ethical hacker, or have an interest in security and would like to gain an understanding on how to protect your environment through different ethical hacking methods and techniques, then this learning path is for you. 

Learning Objectives

To introduce you to the most popular ethical hacking tools including:

  • Various types of footprinting and reconnaissance tools 
  • Network scanning techniques and scanning tools 
  • Enumeration techniques and enumeration tools 
  • SQL injection attacks and injection detection tools 

Useful Tools for Independent learning

Here are two extra resources that will be useful for independent learning:

How to Install Virtual Box 

How to install Kali Linux on Virtual Box 

Prerequisites

  • Basic familiarity with Windows and Linux systems e.g. how to view a system’s IP address, command-line utilities
  • Basic understanding of Network fundamentals e.g. IP addressing, knowledge of protocols such as ICMP, HTTP, and DNS
  • Basic understanding of HTTP fundamentals e.g. Structure of an HTTP request, HTTP method verbs, HTTP response codes 

Feedback

We welcome all feedback and suggestions - please contact us at support@cloudacademy.com if you are unsure about where to start or if you would like help getting started.

Certificate

Your certificate for this learning path
lock

Training Content

1
Course - Beginner - 2m
Introduction: Ethical Hacking Learning Path
This course introduces the Ethical Hacking learning path.
2
Course - Beginner - 2m
Introduction to the Computer Misuse Act (CMA)
This course takes a look at the four main offenses under the Computer Misuse Act (CMA).
3
Course - Beginner - 6m
NMAP Network Scanner: The Basics
This course covers the basics of using Nmap, the network scanner.
4
Resource - Beginner - 10m
Nmap Network Scanner Software Guide
This guide covers the basics of using Nmap, the network scanner
5
Hands-on Lab - Intermediate - 40m
Network Mapping and Target Identification
6
Hands-on Lab - Intermediate - 40m
Interpreting Security Tool Output
7
Course - Beginner - 5m
Netcat Network Utility: The Basics
This course covers the basics of using Netcat, the Network Utility tool.
8
Resource - Beginner - 10m
Netcat Network Utility Software Guide
This guide covers the basics of using Netcat, the Network Utility tool
9
Hands-on Lab - Intermediate - 1h 10m
Security Audit Techniques
10
Hands-on Lab - Intermediate - 30m
Detecting Windows Vulnerabilities
11
Hands-on Lab - Intermediate - 30m
Cracking Passwords in Linux
12
Hands-on Lab - Intermediate - 40m
OWASP Exercises: Dictionary Attack using Hydra
In this lab, you'll learn how to set up Hydra to perform a dictionary attack on a website.
13
Course - Beginner - 6m
Metasploit Vulnerability Exploitation Tool: The Basics
The course covers the basics of using Metasploit, a free penetration testing tool that comes installed in Kali Linux.
14
Resource - Beginner - 10m
Metasploit Vulnerability Exploitation Tool Software Guide
The guide covers the basics of using Metasploit.
15
Hands-on Lab - Intermediate - 30m
Exploiting Vulnerable Network File System (NFS) Shares
16
Hands-on Lab - Intermediate - 40m
Exploiting Remote Procedure Call (RPC) Services
17
Hands-on Lab - Intermediate - 1h
OWASP Exercises: Exploiting the Heartbleed Bug
In this lab, you'll perform the Heartbleed attack using the MetaSploit Framework in order to dump the contents of a vulnerable webserver using an unpatched version of OpenSSL.
18
Course - Beginner - 3m
Nikto Web App Scanner: The Basics
This course covers the basics of using Nikto, the web app vulnerability scanner.
19
Resource - Beginner - 5m
Nikto Web App Scanner Software Guide
This guide covers the basics of using Nikto, the web app vulnerability scanner.
20
Course - Beginner - 7m
SQLmap SQL Injection Tool: The Basics
This course covers the basics of using SQLmap, an open-source tool used in penetration testing to detect and exploit SQL injection flaws.
21
Resource - Beginner - 10m
SQLmap SQL Injection Tool Software Guide
This guide covers the basics of using sqlmap.
22
Hands-on Lab - Intermediate - 30m
Execute a Stored Cross-Site Scripting (XSS) Attack
23
Hands-on Lab - Intermediate - 30m
Execute a Reflected Cross-Site Scripting (XSS) Attack
24
Hands-on Lab - Intermediate - 1h
OWASP Exercises: Cross-Site Scripting Attack
In this lab, you'll learn how to navigate through DVWA to perform an XSS attack to retrieve a session cookie.
25
Resource - Beginner - 15m
OWASP Top 10 Cheat Sheet
An introduction to the Open Web Application Security Project (OWASP) list of the top 10 most critical risks to web applications
26
Exam - 10m
Knowledge Check: Ethical Hacking - Cross-Site Scripting
Knowledge Check: Ethical Hacking - Cross-Site Scripting
27
Hands-on Lab - Intermediate - 30m
Perform a SQL Injection (SQLi) Attack
28
Hands-on Lab - Intermediate - 1h
OWASP Exercises: SQL Injection
This lab shows how to manage the security level of a DVWA application and how to perform a SQL injection to a DVWA application.
29
Exam - 10m
Knowledge Check: Ethical Hacking - SQL Injection
Knowledge Check: Ethical Hacking - SQL Injection
30
Course - Beginner - 8m
Burpsuite Web App Proxy: The Basics
This course covers the basics of using Burp Suite, the web app proxy, an industry-standard penetration testing tool.
31
Resource - Beginner - 10m
Burpsuite Web App Proxy Software Guide
This guide covers the basics of using Burp Suite, the web app proxy.
32
Course - Beginner - 3m
DirBuster Vulnerability Scanner: The Basics
This course covers the basics of using DirBuster, the directory buster.
33
Resource - Beginner - 10m
Dirbuster Vulnerability Scanner Software Guide
This guide covers the basics of using DirBuster, the directory buster.
34
Hands-on Lab - Intermediate - 1h
OWASP Exercises: Command Execution
This lab shows how to manage the security level of a DVWA application and how to perform a Command Execution attack from a DVWA application.
35
Course - Beginner - 2m
Droopescan Vulnerability Exploitation Tool: The Basics
This course covers the basics of using Droopescan, the Drupal CMS Scanner, a plugin-based scanner that is used to identify any issues in Drupal-based CMSes.
36
Resource - Beginner - 5m
Droopescan Vulnerability Exploitation Tool Software Guide
This guide covers the basics of using Droopescan
37
Exam - 10m
Knowledge Check: Basics of Ethical Hacking
Knowledge Check: Basics of Ethical Hacking
About the Author
Students3205
Labs6
Courses1
Learning paths3

Richard Beck is Director of Cyber Security at QA. He works with customers to build effective and successful security training solutions tailored for business needs. Richard has over 15 years' experience in senior Information Security roles. Prior to QA, Richard was Head of Information Security for an organization that underpins 20% of the UK's Critical National Infrastructure. Richard also held Security and Technical Management posts in the Defence, Financial Services, and HMG. Richard sits on a number of security advisory panels and previously chaired the Communication Industry Personnel Security Information Exchange (CPNI). Richard is also a STEM Ambassador working to engage and enthuse young people in the area of cybersecurity. Providing a unique perspective on the world of cybersecurity to teachers and encourage young people to consider a career in cybersecurity.