Practical Ethical Hacking: Lecture Notes
Instructor Introduction
- Instructor: Heath Adams
- Background: Ethical hacker, teacher, business owner at TCM Security
- TCM Security: Cybersecurity consulting and education firm
Overview of Ethical Hacking
- Ethical hacking involves attempting to break into systems (network, wireless, web apps, physical)
- Industry is booming, attracting professionals from diverse backgrounds
Course Structure
- Course Duration: 12 hours of 25-hour course
- Focus: Basics of ethical hacking through hands-on techniques
- Resources: LinkedIn, Twitter, YouTube, Twitch for networking and learning
- Certification: Leads to Practical Network Penetration Tester Certification
Course Curriculum
Introduction and Note Keeping
- Importance of note keeping for assessments
- Setting up environments and labs
Computer Networking
- Understanding computer networks and protocols
Python Programming
- Basics of Python scripting and its application in ethical hacking
Ethical Hacking Methodology
-
Information Gathering
- Passive recon: Social media, email discovery
- Active recon: Scanning and enumerating networks
-
Scanning and Enumeration
- Tools: Nmap, Nessus, Netstat, etc.
- Identifying vulnerabilities and potential exploits
-
Exploitation
- Gaining access to systems
- Techniques for exploiting vulnerabilities
-
Post-Exploitation
- Maintaining access
- Covering tracks and cleaning up
-
Capstone Projects and Practice Boxes
- Hands-on practice with intentionally vulnerable machines
- Applying learned techniques to real-world scenarios
Career Insights
- Work Environment: Remote work, high salaries, and job satisfaction
- Important Skills:
- Technical: Linux, networking, scripting, Active Directory, web app testing
- Soft Skills: Communication, report writing, continuous learning, and perseverance
Ethical Hacking Engagements
- Types of assessments: Network (external/internal), web app, wireless, social engineering
- Importance of reporting: Writing reports and debriefing clients
Key Takeaways
- Ethical hacking is a dynamic, rewarding career with diverse opportunities
- Continuous learning and adaptation are essential for success
- Practical hands-on experience is crucial for skill development
Note Taking Tools
- Recommended: Keep Note, CherryTree, OneNote, Joplin
- Importance of organized notes for personal and professional growth
These notes outline the key concepts and structure of the Practical Ethical Hacking course provided by Heath Adams. They provide an overview of the content, the ethical hacking methodology, resources for continuous learning, and insights into the career of an ethical hacker.