1 00:00:06,660 --> 00:00:08,380 - Welcome to module four, 2 00:00:08,380 --> 00:00:12,470 Fundamentals of Ethical Hacking and Penetration Testing. 3 00:00:12,470 --> 00:00:15,880 This module starts with an overview of ethical hacking 4 00:00:15,880 --> 00:00:17,940 and penetration testing. 5 00:00:17,940 --> 00:00:22,260 I always say that hacking is not about cool tools. 6 00:00:22,260 --> 00:00:24,712 It is about thinking like an attacker 7 00:00:24,712 --> 00:00:27,540 and having a good methodology. 8 00:00:27,540 --> 00:00:29,010 In this module, 9 00:00:29,010 --> 00:00:31,010 you will learn the different methodologies 10 00:00:31,010 --> 00:00:34,780 that real-world attackers use to penetrate networks 11 00:00:34,780 --> 00:00:37,130 and underlying systems. 12 00:00:37,130 --> 00:00:41,180 You will learn how attackers perform information gathering, 13 00:00:41,180 --> 00:00:44,470 passive reconnaissance, active reconnaissance, 14 00:00:44,470 --> 00:00:47,130 scanning and enumeration. 15 00:00:47,130 --> 00:00:51,490 You will learn how to hack web servers and web applications, 16 00:00:51,490 --> 00:00:55,010 how to exploit SQL injection vulnerabilities 17 00:00:55,010 --> 00:00:58,660 and fundamentals of wireless hacking. 18 00:00:58,660 --> 00:01:01,610 I will also go over best practices 19 00:01:01,610 --> 00:01:04,600 on how you can build your own hacking lab. 20 00:01:04,600 --> 00:01:07,240 And you will learn about many different tools 21 00:01:07,240 --> 00:01:09,460 including Aircrack-ng 22 00:01:09,460 --> 00:01:12,160 and how to create your own tools 23 00:01:12,160 --> 00:01:13,820 to take advantage of flaws 24 00:01:13,820 --> 00:01:16,010 like buffer overflow vulnerabilities 25 00:01:16,010 --> 00:01:20,180 and perform different post-exploitation techniques. 26 00:01:20,180 --> 00:01:23,460 You will also learn how to hack user credentials 27 00:01:23,460 --> 00:01:26,483 and how to create penetration testing reports.