Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)
The Cyber Mentor
Welcome to the Practical Ethical Hacking Course!
My name is Heath Adams, and I'll be your instructor for the entirety of this 15-
hour course. I am the CEO of TCM Security, a cybersecurity consulting firm and
educational institution. On a day-to-day basis, we primarily focus on ethical
hacking, where companies hire us to try to hack into their systems to find
vulnerabilities and let them know of any security issues they may have.
We cover a lot of different types of hacking in this course, including network, web
application, wireless network, mobile application, thick client application, and
physical pen testing.
Hacking is an interesting field because you don't necessarily have to come from an
IT background. I'm actually a former accountant who fell in love with hacking. As
long as you have some basic computer and networking knowledge, you can succeed in
this course. We'll hold your hand the entire way and make sure you understand
everything presented to you.
I hold several hacker certifications, and you can find my social media information
in the course description below.
About the Course
This course is an extension of a 25-hour curriculum available on our TCM Security
Academy website. The first half of the 15-hour course covers the same content. The
course is up-to-date for 2023, and we've added new content to make sure it's fresh
and current.
The course costs $29.99, and we have an all-access pass to our academy courses for
the same price.
The course leads to a certification called the PMPT, the Practical Network
Penetration Testing Certification. It's a one-of-a-kind certification that gets you
job-ready for the field.
A Day in the Life of an Ethical Hacker
As ethical hackers, our day-to-day activities can include:
Performing an assessment, which can involve different types of pen testing or
ethical hacking.
Writing a report.
Giving a debrief.
We'll cover the most common types of assessments in this course, and some others as
well.
Types of Assessments as an Ethical Hacker
When delivering a report to a client, it is important to cover the whole process
from start to finish. Let's discuss the various types of assessments that can be
performed as an ethical hacker:
External Network Pen Test: This is the most common type of pen test, which involves
looking at an organization's security from the outside.
Internal Network Pen Test: This involves assessing an organization's security from
the inside of the network.
Web Application Pen Test: This is the second most common type of pen test and
focuses heavily on web-based attacks.
External Network Pen Test
The methodology for external pen tests focuses heavily on open source intelligence
gathering (OSINT). This is because external assessments require gathering as much
intel and data about an organization as possible. This can include details about
employees, email formats, past breaches, passwords used in those breaches, and
more. The goal is to use this information to breach the organization's security
from the outside.
The Cyber Mentor
Welcome to the Practical Ethical Hacking Course!
My name is Heath Adams, and I'll be your instructor for the entirety of this 15-
hour course. I am the CEO of TCM Security, a cybersecurity consulting firm and
educational institution. On a day-to-day basis, we primarily focus on ethical
hacking, where companies hire us to try to hack into their systems to find
vulnerabilities and let them know of any security issues they may have.
We cover a lot of different types of hacking in this course, including network, web
application, wireless network, mobile application, thick client application, and
physical pen testing.
Hacking is an interesting field because you don't necessarily have to come from an
IT background. I'm actually a former accountant who fell in love with hacking. As
long as you have some basic computer and networking knowledge, you can succeed in
this course. We'll hold your hand the entire way and make sure you understand
everything presented to you.
I hold several hacker certifications, and you can find my social media information
in the course description below.
About the Course
This course is an extension of a 25-hour curriculum available on our TCM Security
Academy website. The first half of the 15-hour course covers the same content. The
course is up-to-date for 2023, and we've added new content to make sure it's fresh
and current.
The course costs $29.99, and we have an all-access pass to our academy courses for
the same price.
The course leads to a certification called the PMPT, the Practical Network
Penetration Testing Certification. It's a one-of-a-kind certification that gets you
job-ready for the field.
A Day in the Life of an Ethical Hacker
As ethical hackers, our day-to-day activities can include:
Performing an assessment, which can involve different types of pen testing or
ethical hacking.
Writing a report.
Giving a debrief.
We'll cover the most common types of assessments in this course, and some others as
well.
Types of Assessments as an Ethical Hacker
When delivering a report to a client, it is important to cover the whole process
from start to finish. Let's discuss the various types of assessments that can be
performed as an ethical hacker:
External Network Pen Test: This is the most common type of pen test, which involves
looking at an organization's security from the outside.
Internal Network Pen Test: This involves assessing an organization's security from
the inside of the network.
Web Application Pen Test: This is the second most common type of pen test and
focuses heavily on web-based attacks.
External Network Pen Test
The methodology for external pen tests focuses heavily on open source intelligence
gathering (OSINT). This is because external assessments require gathering as much
intel and data about an organization as possible. This can include details about
employees, email formats, past breaches, passwords used in those breaches, and
more. The goal is to use this information to breach the organization's security
from the outside.