
TCM Security – Practical Ethical Hacking 2024-9
Published on: 2024-11-08 00:34:24
Categories: 28
Descriptions
Practical Ethical Hacking, Welcome to this course on Practical Ethical Hacking. To enjoy this course, you need nothing but a positive attitude and a desire to learn. No prior hacking knowledge is required. In this course, you will learn the practical side of ethical hacking. Too many courses teach students tools and concepts that are never used in the real world. In this course, we will focus only on tools and topics that will make you successful as an ethical hacker. The course is incredibly hands on and will cover many foundational topics.
What you’ll learn
- A Day in the Life of an Ethical Hacker. What does an ethical hacker do on a day to day basis? How much can he or she make? What type of assessments might an ethical hacker perform? These questions and more will be answered.
- Effective Notekeeping. An ethical hacker is only as good as the notes he or she keeps. We will discuss the important tools you can use to keep notes and be successful in the course and in the field.
- Networking Refresher. This section focuses on the concepts of computer networking. We will discuss common ports and protocols, the OSI model, subnetting, and even walk through a network build with using Cisco CLI.
- Hacking Methodology. This section overviews the five stages of hacking, which we will dive deeper into as the course progresses.
- Reconnaissance and Information Gathering. You’ll learn how to dig up information on a client using open source intelligence. Better yet, you’ll learn how to extract breached credentials from databases to perform credential stuffing attacks, hunt down subdomains during client engagements, and gather information with Burp Suite.
Specificatoin of Practical Ethical Hacking
- Publisher : TCM Security
- Teacher : Heath Adams
- Language : English
- Level : All Levels
- Number of Course : 186
- Duration : 24 hours and 32 minutes
Content of Practical Ethical Hacking

Requirements
- Basic IT, Linux, and Programming knowledge
- For Mid-Course Capstone: A minimum of 12GB of RAM is suggested.
- For Wireless Hacking: A wireless adapter that supports monitor mode (links provided in course).
- For Active Directory Lab Build: A minimum of 16GB of RAM is suggested. Students can still participate in the course, but may experience slow lab environments.
Pictures

Sample Clip
Installation Guide
Extract the files and watch with your favorite player
Subtitle : Not Available
Quality: 1080p
Download Links
Download Part 1 – 1 GB
Download Part 2 – 1 GB
Download Part 3 – 1 GB
Download Part 4 – 1 GB
Download Part 5 – 428 MB
File size
4.41 GB
Leave a Comment (Please sign to comment)