Purchase
Enter Price Code
Student
Instructor
IT Professional
Customer Support
Contact Us
TestOut Help Center
LMS Integration
Sign Up
CertMaster Login
Hands-on Technology Courseware
Courses
Course Catalog
Why TestOut
LabSim Learning Platform
TestOut Training
Lab Simulations
Customer Success
Certifications
Overview
Benefits
Pro Exams
Pro Exam Catalog
Pro Exam Resources
Wall of Fame
Who We Serve
K12 Education
Higher Education
Professionals
Resources
Product Guides
Job-Role Pathways
Educator Resources
Student Resources
TestOut Blog
Facebook Instructor Community
IT Career Interest Survey
Cybersecurity Scary Stories
How-To Guide for Passing ITF+
Unplugged Classroom Activities
Request Instructor Access
Ethical Hacker Pro
Certification Objectives
TestOut
Ethical Hacker Pro
Certification Objectives
Prepare
Perform reconnaissance
Perform reconnaissance with operating system tools
Perform reconnaissance with hacking tools
Perform scanning
Scan for network devices
Discover wireless devices
Scan for IoT devices
Detect operating systems and applications
Identify open ports
Scan for vulnerabilities
Perform enumeration
Enumerate network resources
Enumerate users and groups
Enumerate device information
Enumerate services and applications
Enumerate DNS
Gain Access
Obtain login credentials
Crack passwords
Use Social Engineering
Gain administrative access and escalate privileges
Gain access through a backdoor
Escalate privileges
Hijack a web session
Gain access by cracking
Obtain credentials through sniffing
Crack Wi-Fi devices
Attack
Perform passive online attacks
Examine hidden web form fields
Conduct a man-in-the-middle attack
Implement a replay attack
Perform active online attacks
Perform an SQL injection
Execute a DoS or DDoS attack
Perform infrastructure attacks
Attack a web server
Access wireless networks
Attack mobile devices
Access IoT
Evade firewalls, IDSs, and honeypots
Cover up
Cover up access
Disable auditing
Clear logs
Remove or hide files and folders
Change MAC address
Defend a System
Defend systems and devices
Hide a web server banner broadcast
Configure rogue host protection
Secure mobile devices
Configure account policies and account control
Implement defensive systems
Implement an Intrusion Detection System (IDS)
Create a honeypot
Prevent DNS zone transfer
Scan for vulnerabilities
Scan for vulnerabilities on Windows or Linux systems
Scan for vulnerabilities on servers, wireless devices, and appliances
Explore TestOut Pro Certifications
Benefits
Pro Exams
Resources