Ethical Hacking - Intermediate Hands-on Training

person icon Cliff Krahenbill

Ethical Hacking - Intermediate Hands-on Training

Ethical Hacking - Intermediate Hands-on Training is an intermediate hands-on course for learning ethical hacking.

updated on icon Updated on Oct, 2023

language icon Language - English

person icon Cliff Krahenbill

architecture icon IT & Software,Network & Security

Lectures -51

Resources -43

Duration -8 hours


30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 19,000+ top Tutorialspoint courses anytime, anywhere.

Course Description

Alert -

Intermediate Ethical Hacking Hands-on Training is a continuation of Ethical Hacking - Hands-on Training Part I. Before taking this course, students should have completed an introduction to an ethical hacking or pentesting course. For best results, students should have completed Ethical Hacking - Hands-on Training Part I before signing up for the intermediate course.  

Intermediate Ethical Hacking Hands-on Training picks up where Part I leaves off. In Part I, students were taught the fundamentals of pentesting while being introduced to some basic skills. 

Intermediate Ethical Hacking Hands-On Training provides an intermediate level of white, grey, and black hat skills every cybersecurity professional needs to know.  Advanced reconnaissance techniques are taught using the NMap scripting engine and various hacking tools used by pentesters.

Sections include Web Application Attacks, Wireless Network Attacks, PowerShell Empire, Netcat, and Wireshark Fundamentals. 

For the best experience in learning to be an ethical hacker or pentester, students should complete the instructor's complete series on ethical hacking, starting with Ethical Hacking Hands-On Training Part I and proceeding to this intermediate course. 

The three Ethical Hacking Capture the Flag Courses are the capstone series where students apply and use all the techniques taught in the two Ethical hacking courses. 

By the end of the course, you will have a deep understanding of external and internal network penetration testing, wireless penetration testing, and web application penetration testing. The lab exercises in the course are based on real-world application of Red Team best practices. 


What will you learn in this course:

  • Ethical Hacking Fundamentals
  • Network Penetration Testing
  • Discover Critical vulnerabilities
  • Launch Various Man in the Middle attacks.
  • Securing a system from all the major attacks
  • ARP Spoofing/ARP Poisoning


What are the prerequisites for this course?

  • Basic Computer Fundamentals & Terminologies
  • A computer installed with Windows/Linux /OS X
  • Wireless adapter with Monitor Mode support
  • Minimum of 8GB RAM
  • Internet connection
Ethical Hacking - Intermediate Hands-on Training


Check out the detailed breakdown of what’s inside the course

Course Overview
1 Lectures
  • play icon Course Overview and Welcome Video 05:20 05:20
Virtual Lab Build
5 Lectures
2 Lectures
Reverse Shells, Privilege Escalation and Persistent Backdoors
6 Lectures
PowerShell Empire
6 Lectures
Post Exploitation of Microsoft Windows
5 Lectures
Practical Pentesting Labs
6 Lectures
Auditing Wireless Networks
4 Lectures
5 Lectures
Web App Penetration Testing
7 Lectures
Anonymity - Remaining Anonymous While Pentesting
1 Lectures
CTF - SQL Injection to Shell Walkthrough
2 Lectures

Instructor Details

Cliff Krahenbill

Cliff Krahenbill

Prof. K comes to Tutorialspoint with a Master of Science in Cyber Security from UMUC (2015) and Master of Science in Information Technology from Capella University (2007). 

Prof. k has worked in technology since 1998 working as a Microsoft Support Technician, a Microsoft Certified Trainer, Technology support specialist, a Senior Network Technology Consultant, an IT Auditor and most recently as the owner and operator of his own technology firm, CLK Technology Solutions located in Tucson Arizona. Professor K's expertise in technology focuses on designing, building, supporting network infrastructures and network security. 

Professor K has taught online since 2008 and teaches for a number of other online universities and colleges. 

Prof. K holds a number of valid technology certifications including: 

  • MCTS: Windows Server 2008 Active Directory, Configuration
  • MCTS: Windows Server 2008 Applications Infrastructure, Configuration
  • MCTS: Windows Server 2008 Network Infrastructure, Configuration
  • A+, Net+, Security+
  • CompTIA Secure Infrastructure Specialist – CSIS
  • CompTIA IT Operations Specialist – CIOS
  • CIW Associate
  • CIW Certified Instructor (CI)

Professor K spends his spare time working in his wood shop and providing free technical support to the local retirement community in Tucson Arizona.

Course Certificate

User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
People having fun around a laptop

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
People having fun around a laptop

Talk to us