Ethical Hacking and Penetration Testing

This course introduces the basic terminologies used in ethical hacking and useful tools in relation to penetration testing on Kali Linux. Students will learn to explore the vulnerabilities in various systems and operate the industry-leading tools and framework to perform the penetration testing on different target systems.

Coursework

Penetration Test Preparation Report

As part of a research project, I delved into the legal requirements surrounding penetration testing. My investigations led me to scour the internet for insights into the crucial IT and non-IT skills that employers seek in prospective hires. Moreover, I uncovered a growing demand for IT security professionals within corporate environments.

Penetration-Test-Preparation-Report-

Introduction to some basic ethical hacking tools and techniques

The purpose of this laboratory session is to provide an introduction to the rudimentary tools and techniques used in ethical hacking. The session is designed to equip learners with a foundational understanding of ethical hacking, which is an essential component of cybersecurity.

Lab-1-Reconnaissance-and-Scanning

Reconnaissance and Footprinting

This lab involved installing Virtual Machines such as Kali Linux, Metasploitable 2, and Windows XP. Then, we conducted passive and active reconnaissance.

Assignment-3_Reconnaissance-and-Footprinting

Vulnerability Analysis

Assignment-4

Malware and Cryptography

CYSE450-Malware-Attack-and-Cryptography-Lab5

Steganography

Lab-6-Steganography

Packet Sniffing

Extra-Credit-Lab-ArpSpoofing

Using Metasploit Framework 

Assignment-11-Metasploit-Framework

SQL Injection 

SQL-Injection-Lab-compressed