Ethical Hacking and Penetration Testing
This course introduces the basic terminologies used in ethical hacking and useful tools in relation to penetration testing on Kali Linux. I had to explore the vulnerabilities in various systems and operate the industry-leading tools and framework to perform the penetration testing on different target systems.
Through this course, I developed a strong foundation in ethical hacking, emphasizing responsible and legal cybersecurity practices. I gained an in-depth understanding of the principles and legal frameworks that govern ethical hacking, including relevant laws and compliance standards.
Hands-on experience allowed me to perform system hacking and simulate real-world cyberattacks to uncover vulnerabilities in networks and systems. I acquired practical skills in testing and breaching web applications and data servers, applying industry-standard tools and techniques to evaluate security postures.
This experience has equipped me with both the technical abilities and ethical responsibility required to contribute meaningfully to cybersecurity initiatives in a professional setting.
Below include screenshots of my Lab 2: Malware Analysis assignment. This assignment was critical in helping me to understand the concepts of ethical hacking, perform system hacking, and breaching web applications. Additionally, it set me up to learn about the reporting process for ethical hacking.
Below include screenshots of my Lab 4: SQL Injection Attacks assignment. This assignment beneficial in helping me to perform system hacking, web application penetration, and report the process of ethical hacking. The assignment helped me to understand the various SQL vulnerabilities that could happen to unsecured web applications.