This course introduces the basic terminologies used in ethical hacking and useful tools in relation to penetration testing on Kali Linux. Students will learn to explore the vulnerabilities in various systems and operate the industry-leading tools and framework to perform the penetration testing on different target systems.
Coursework
Penetration Test Preparation Report
As part of a research project, I delved into the legal requirements surrounding penetration testing. My investigations led me to scour the internet for insights into the crucial IT and non-IT skills that employers seek in prospective hires. Moreover, I uncovered a growing demand for IT security professionals within corporate environments.
Penetration-Test-Preparation-Report-Introduction to some basic ethical hacking tools and techniques
The purpose of this laboratory session is to provide an introduction to the rudimentary tools and techniques used in ethical hacking. The session is designed to equip learners with a foundational understanding of ethical hacking, which is an essential component of cybersecurity.
Lab-1-Reconnaissance-and-ScanningReconnaissance and Footprinting
This lab involved installing Virtual Machines such as Kali Linux, Metasploitable 2, and Windows XP. Then, we conducted passive and active reconnaissance.
Assignment-3_Reconnaissance-and-FootprintingVulnerability Analysis
Assignment-4Malware and Cryptography
CYSE450-Malware-Attack-and-Cryptography-Lab5Steganography
Lab-6-SteganographyPacket Sniffing
Extra-Credit-Lab-ArpSpoofingUsing Metasploit Framework
Assignment-11-Metasploit-FrameworkSQL Injection
SQL-Injection-Lab-compressed