Cybersecurity Foundations Training Course

  • Designed for results
  • World-class experts
  • Flexible online learning

Overview

Prepare yourself for a career in cybersecurity with this self-paced online training course. In 26 hours of targeted lessons, expert trainer Omar Santos will help you learn cybersecurity fundamentals. You’ll also enhance your resume with hands-on experience completing pen testing and ethical hacking guided labs. Each lesson builds on the next, and flashcards and quizzes are provided to help you master key topics.

Who should take this course

Skill level | Beginner

  • Anyone interested in a career in cybersecurity
  • Anyone interested in learning the fundamentals of security and networking
  • Anyone looking for hands-on training with pen testing and ethical hacking

Course participants should have a basic knowledge of IT and be comfortable working with a computer.

For an optimal course experience, we recommend using these browsers and devices.

Course includes

  • 26 hours of expert-led training videos to watch and learn at your own pace
  • Hands-on labs that demonstrate completing tasks in real time to simulate real-world experience with essential cybersecurity tasks
  • Self-study tools, such as flashcards to master key terms, and quizzes to self-assess your progress
  • 1 year of access*

What you'll learn

This Pearson IT Training Course provides a complete learning path to build your skills as a cybersecurity professional. Topics covered include the following:

  • Networking and Security Basics
  • Cybersecurity Management, Monitoring, and Analysis
  • Network Security Telemetry
  • Digital Forensics and Incident Response (DFIR)
  • Fundamentals of Ethical Hacking and Penetration Testing
  • Advanced Wireless Hacking and Penetration Testing
  • Mobile Device Security
  • Internet of Things (IoT) Security

*Retake guarantee

Retake guaranteeDidn't pass your certification exam on your first try? We'll give you six months of additional access at no cost.

About Pearson IT Training Courses

Pearson IT Training Courses are complete and affordable packages of expert-led, self-paced courses designed to help you stand out with in-demand skills that take your career to the next level.

From learning to hands-on practice and application, our comprehensive certification prep courses ensure you are ready for exam success.

Course expert

  • Omar Santos - Best-selling author, expert trainer, and Principal Engineer at Cisco (PSIRT)

    Omar Santos

    Omar is the author of over 20 books and video courses, as well as numerous white papers, articles, and security configuration guidelines and best practices. Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities. Additional information about Omar’s current projects can be found at omarsantos.io and you can follow Omar on Twitter @santosomar.

  • Ron Taylor - Author, Speaker, and Cisco Security Architect

    Ron Taylor

    Ron Taylor has been in the Information Security field for over 20 years working in various areas focusing on both offense and defensive security roles. Ten of those years were spent in consulting. In 2008, he joined the Cisco Global Certification Team as an SME in Information Assurance. In 2012, he moved into a position with the Security Research & Operations group, where his focus was mostly on penetration testing of Cisco products and services. He was also involved in developing and presenting security training to internal development and test teams globally. Additionally, he provided consulting support to many product teams as an SME on product security testing. He then spent some time as an Incident Manager for the Cisco Product Security Incident Response Team (PSIRT). His current role is a Security Architect specializing in Cisco’s security product line. He has held a number of industry certifications including GPEN, GWEB, GCIA, GCIH, GWAPT, RHCE, CCSP, CCNA, CISSP, Pentest+ and MCSE. Ron has also authored books and video courses, teaches, and is involved in organizing a number of cybersecurity conferences including the Bsides Raleigh, Texas Cyber Summit, Grayhat and the Red Team Village at DEFCON. His Twitter handle is @Gu5G0rman. You can also find him on LinkedIn.

  • Jon Sternstein - Award-winning cybersecurity expert, consultant, and instructor

    Jon Sternstein

    Jon Sternstein is the Founder/Principal of Stern Security, the cybersecurity company behind Velocity, the internal and vendor risk management platform velocitysec.com. He holds many security certifications, including GPEN, CISSP, and Certified Ethical Hacker. Jon has been a featured cybersecurity expert on ABC News, WRAL News, and CBS News, as well as in ISSA Journal, PenTest Magazine, and Business North Carolina Magazine. Stern Security’s website is sternsecurity.com.

  • Chris McCoy - CCIE certified advanced security expert and instructor

    Chris McCoy

    Chris McCoy is a principal security research engineer in Cisco's Advanced Security Initiatives Group (ASIG). He has over 25 years of experience in the networking and security industry. He has a passion for computer security, finding flaws in mission-critical systems, and designing mitigations to thwart motivated and resourceful adversaries. He was formerly with Spirent Communications and the U.S. Air Force. Chris is CCIE certified (Emeritus #11801) in the Routing & Switching and Service Provider tracks, which he has held for over 10 years. His Twitter handle is @chris_mccoy.

Course outline

  • Introduction
  • Lesson 1: Networking Fundamentals
    • Learning objectives
    • Reviewing the OSI Model
    • Reviewing the TCP/IP Network Models
    • Surveying Common Networking Protocols: DHCP
    • Surveying Common Networking Protocols: Routing Protocols
    • Surveying Common Networking Protocols: ICMP
    • Surveying Common Networking Protocols: DNS
    • Identifying Networking Device Types
    • Understanding IP SubnetsExamining VLANs and Data Visibility
    • Examining VLANs and Data Visibility
  • Lesson 2: Security Principles
    • Learning objectives
    • Understanding Defense-in-Depth
    • Identifying Threats, Vulnerabilities, and Exploits and Their Associated Risk
    • Identifying Threat Actors
    • Understanding Reverse Engineering
    • Understanding Chain of Custody
    • Examining Run Books
    • Introducing PII and PHI
    • Understanding Principle of Least Privilege
    • Performing Risk Assessment
    • Lesson 2: Flashcards
    • Lesson 2: Quiz
  • Lesson 3: Access Control Models
    • Learning objectives
    • Understanding Confidentiality, Integrity, and Availability
    • Understanding Authentication, Authorization, and Accounting
    • Examining the Access Control Process: Terminology and Data Classification
    • Examining the Access Control Process: Data States and Policy Roles
    • Lab: Viewing the Windows File Registry
    • Examining the Access Control Process: Security and Access Control Classification
    • Understanding Discretionary Access Control
    • Understanding Mandatory Access Control
    • Understanding Role Based Access Control
    • Understanding Attribute Based Access Control
    • Lesson 3: Flashcards
    • Lesson 3: Quiz
  • Lesson 4: Fundamentals of Cryptography and PKI
    • Learning objectives
    • Understanding the Basic Components of Cryptography
    • Introducing Public Key Infrastructure
    • Deciphering Encryption Algorithms
    • Understanding Hashing Algorithms
    • Lab: Applying Symmetric Key Encryption
    • Examining Secure Socket Layer and Transport Layer Security
    • Lab: Configuring a Switch to Learn its IP Address with DHCP
    • Examining Digital Certificates
    • Lesson 4: Flashcards
    • Lesson 4: Quiz
  • Lesson 5: Introduction to Virtual Private Networks (VPNs)
    • Learning objectives
    • Introducing VPNs and Why We Use Them
    • Examining Remote Access VPNs
    • Lab: Generating a Symmetric Key
    • Examining Site-to-Site VPNs
    • Understanding IPsec Concepts, Components, and Operations
    • Lab: Using Dig for Passive Reconnaissance
    • Lab: Using Social Engineering Techniques to Plan an Attack
    • Lab: Attacking a Website Using XSS Injection
    • Surveying Cisco VPN Solutions: Traditional IPsec, DMVPN, FlexVPN
    • Surveying Cisco VPN Solutions: Clientless SSL and AnyConnect
    • Lab: Configuring Clientless SSL VPNs on ASDM
    • Lesson 5: Flashcards
    • Lesson 5: Quiz
  • Lesson 6: Endpoint Security Technologies
    • Learning objectives
    • Examining Host-Based Intrusion Detection
    • Exploring Antimalware and Antivirus
    • Understanding Host-based Firewalls
    • Lab: Using Uncomplicated Firewall (UFW)
    • Exploring Application-level Whitelisting/Blacklisting
    • Exploring Systems-based Sandboxing
    • Lesson 6: Flashcards
    • Lesson 6: Quiz
  • Lesson 7: Types of Attacks and Vulnerabilities
    • Learning objectives
    • Surveying Types of Vulnerabilities
    • Understanding Passive Reconnaissance and Social Engineering
    • Understanding Active Reconnaissance Port Scanning and Host Profiling
    • Understanding Privilege Escalation and Code Execution Attacks
    • Understanding Backdoors and Man-in-the Middle Attacks
    • Understanding Denial of Service Attacks
    • Surveying Attack Methods for Data Exfiltration
    • Understanding ARP Cache Poisoning and Route Manipulation Attacks
    • Understanding Password Attacks
    • Understanding Wireless Attacks
    • Exploring Security Evasion Techniques
    • Lab: Configuring a BPDU Guard and Implementing Port Security
    • Lesson 7: Flashcards
    • Lesson 7: Quiz
  • Lesson 8: Threat Analysis
    • Learning objectives
    • Understanding Risk Analysis
    • Understanding the Common Vulnerability Scoring System (CVSS)
    • Interpreting Malware Analysis Tool Output
    • Lab: Using the theHarvester Tool
    • Lesson 8: Flashcards
    • Lesson 8: Quiz
  • Lesson 9: Introduction to Security Management
    • Learning objectives
    • Surveying Asset Management
    • Surveying Configuration Management
    • Surveying Mobile Device Management
    • Surveying Patch Management
    • Lab: Configuring Inbound Rules for a Firewall
    • Lab: Installing And Using Nfdump
    • Surveying Vulnerability Management
    • Understanding Network and Host Antivirus
    • Lab: Performing Active Reconnaissance
    • Understanding SEIM and Log Collection
    • Lesson 9: Flashcards
    • Lesson 9: Quiz
  • Lesson 10: Windows, Linux, and MAC OS X Based Analysis
    • Learning objectives
    • Understanding Windows Forensics Basics
    • Understanding Linux and MAC OS X Forensics Basics
    • Lab: Viewing and Changing File Permissions
    • Lab: Viewing Processes in Linux (Background+ Foreground)
    • Examining Web Server Logs
    • Lab: Enabling and Disabling VLANs on a Switch
    • Lesson 10: Flashcards
    • Lesson 10: Quiz
  • Lesson 11: Network and Host Telemetry
    • Learning objectives
    • Introducing NetFlow
    • Surveying Commercial and Open Source NetFlow Tools
    • Understanding Flexible NetFlow
    • Examining Firewall Logs
    • Understanding Application Visibility and Control
    • Examining Web and Email Content Filtering Logs
    • Lab: Performing Reconnaissance on a Network
    • Exploring Full Packet Capture
    • Surveying IPS Events
    • Surveying Host or Endpoint Events
    • Lesson 11: Flashcards
    • Lesson 11: Quiz
  • Lesson 12: Introduction to NetFlow and IPFIX
    • Learning objectives
    • Introduction to NetFlow
    • Lab: Implementing IPsec VPNs through CLI
    • Lab: Configuring NetFlow and NetFlow Data Export
    • The Attack Continuum
    • The Network as a Sensor and as an Enforcer
    • What Is a Flow?
    • NetFlow Versus IP Accounting and Billing
    • NetFlow for Network Security
    • Traffic Engineering and Network Planning
    • Introduction to IP Flow Information Export (IPFIX)
    • Cisco Supported Platforms for NetFlow
    • NetFlow Versions and History
  • Lesson 13: NetFlow Deployment Scenarios
    • Learning objectives
    • Introduction to Cisco Cyber Threat Defense
    • Deployment Scenario: User Access Layer
    • Deployment Scenario: Wireless LAN
    • Deployment Scenario: Internet Edge
    • Deployment Scenario: Data Center
    • Deployment Scenario: NetFlow in Site-to-Site and Remote VPNs
    • NetFlow Collection Considerations and Best Practices
    • Determining the Flows per Second and Scalability
    • Lesson 13: Flashcards
    • Lesson 13: Quiz
  • Lesson 14: NetFlow Commercial and Open Source Monitoring and Analysis Software Packages
    • Learning objectives
    • Commercial NetFlow Monitoring and Analysis Software Packages
    • NFdump
    • NfSen
    • Lab: Using OpenSSL to Create a Public/Private Key Pair
    • Lab: Generating an Asymmetric Key
    • SiLK
    • Elasticsearch, Logstash, and Kibana Stack (ELK): Overview and Architecture
    • Lab: Installing Logstash and Kibana
    • ELK: Installation and Configuration Files
    • Lesson 14: Flashcards
    • Lesson 14: Quiz
  • Lesson 15: Forensics
    • Learning objectives
    • Examining Types of Evidence
    • Surveying Windows Forensics: Application Processes, Threads, and Vulnerabilities
    • Surveying Windows Forensics: Memory
    • Surveying Windows Forensics: The Windows Registry
    • Surveying Windows Forensics: Hard Drives, FAT, and NTFS
    • Surveying Linux Forensics
    • Understanding Evidence Collection
    • Handling Evidence
    • Examining Asset and Threat Actor Attribution
    • Lesson 15: Flashcards
    • Lesson 15: Quiz
  • Lesson 16: Intrusion Analysis
    • Learning objectives
    • Introducing Intrusion Analysis Fundamentals
    • Examining Packet Captures
    • Examining Protocol Headers
    • Analyzing Security Device Data
    • Differentiating False Positives, False Negatives, True Positives, and True Negatives
    • Lesson 16: Flashcards
    • Lesson 16: Quiz
  • Lesson 17: Introduction to Incident Response
    • Learning objectives
    • Scoping the Incident Response Plan and Process
    • Understanding Information Sharing and Coordination
    • Lab: Using Burpsuite
    • Identifying the Incident Response Team Structure
    • Lesson 17: Flashcards
    • Lesson 17: Quiz
  • Lesson 18: Incident Response Teams
    • Learning objectives
    • Analyzing Computer Incident Response Teams (CSIRTs)
    • Analyzing Product Security Incident Response Teams (PSIRTs)
    • Surveying Coordination Centers
    • Analyzing Managed Security Service Providers Incident Response Teams
    • Lesson 18: Flashcards
    • Lesson 18: Quiz
  • Lesson 19: Network and Host Profiling
    • Learning objectives
    • Understanding Network Profiling
    • Lab: Using Kismet
    • Understanding Host Profiling
    • Lesson 19: Flashcards
    • Lesson 19: Quiz
  • Lesson 20: Data and Event Analysis
    • Learning objectives
    • Understanding Data Normalization
    • Deconstructing Universal Data Formats
    • Understanding the 5-tuple Correlation
    • Performing DNS Analysis
    • Lab: Using Maltego
    • Performing Web Log Analysis
    • Performing Deterministic and Probabilistic Analysis
    • Lab: Exploiting a Website Using SQL Injection
    • Lesson 20: Flashcards
    • Lesson 20: Quiz
  • Lesson 21: Intrusion Event Categories
    • Learning objectives
    • Identifying and Mitigating Reconnaissance
    • Identifying and Mitigating Weaponization
    • Identifying and Mitigating Delivery
    • Identifying and Mitigating Exploitation
    • Identifying and Mitigating Installation
    • Identifying and Mitigating Command and Control
    • Understanding Action on Objectives
    • Lesson 21: Flashcards
    • Lesson 21: Quiz
  • Lesson 22: The Incident Handling Process
    • Learning objectives
    • Introducing the Vocabulary for Event Recording and Incident Sharing (VERIS)
    • Applying the VERIS Schema to Incident Handling
    • Surveying the VERIS Incident Recording Tool and Other VERIS Resources
    • Lab: Grabbing a Screenshot of a Target Machine Using Metasploit
    • Lesson 22: Flashcards
    • Lesson 22: Quiz
  • Lesson 23: Overview of Ethical Hacking and Penetration Testing
    • Learning objectives
    • Introducing Ethical Hacking and Pen Testing
    • Getting Started with Ethical Hacking and Pen Testing
    • Understanding the Legal Aspects of Penetration Testing
    • Lab: Observing an SHA-Generated Hash Value
    • Exploring Penetration Testing Methodologies
    • Lab: Configuring DHCP Snooping
    • Exploring Penetration Testing and other Cyber Security Certifications
    • Building Your Own Lab: Overview
    • Building Your Own Lab: VIRL and Operating System Software
    • Understanding Vulnerabilities, Threats, and Exploits
    • Understanding the Current Threat Landscape
    • Lesson 23: Flashcards
    • Lesson 23: Quiz
  • Lesson 24: Passive Reconnaissance
    • Learning objectives
    • Understanding Passive Reconnaissance
    • Exploring Passive Reconnaissance Methodologies: Discovering Host and Port Information
    • Exploring Passive Reconnaissance Methodologies: Searching for Files
    • Exploring Passive Reconnaissance Methodologies: Searching for Names, Passwords, and Sensitive Information
    • Lab: Enabling a Keylogger in a Target Machine
    • Surveying Essential Tools for Passive Reconnaissance: SpiderFoot, theHarvester, and Discover
    • Lab: Managing NTFS Permissions
    • Surveying Essential Tools for Passive Reconnaissance: Recon-ng
    • Lesson 24: Flashcards
    • Lesson 24: Quiz
  • Lesson 25: Active Reconnaissance
    • Learning objectives
    • Understanding Active Reconnaissance
    • Exploring Active Reconnaissance Methodologies from an Ethical Hacker Perspective
    • Surveying Essential Tools for Active Reconnaissance: Port Scanning and Web Service Review
    • Lab: Simulating a DoS Attack
    • Surveying Essential Tools for Active Reconnaissance: Network and Web Vulnerability Scanners
    • Lesson 25: Flashcards
    • Lesson 25: Quiz
  • Lesson 26: Hacking Web Applications
    • Learning objectives
    • Understanding Web Applications
    • Understanding Web Architectures
    • Uncovering Web Vulnerabilities
    • Testing Web Applications: Methodology
    • Lab: Configuring Site-to-Site IPsec VPN Topology
    • Testing Web Applications: Reconnaissance
    • Testing Web Applications: Mapping
    • Lab: Get settings and information about ports of TCP
    • Testing Web Applications: Vulnerability Discovery
    • Understanding the Exploitation of Web Applications
    • Surveying Defenses to Mitigate Web Application Hacking
    • Lesson 26: Flashcards
    • Lesson 26: Quiz
  • Lesson 27: Hacking Networking Devices
    • Learning objectives
    • Understanding the Reasons for and the Steps to Hacking a Network
    • Reviewing Networking Technology Fundamentals: OSI and DoD Internet Models
    • Reviewing Networking Technology Fundamentals: Forwarding Device Architecture and Communication
    • Building an Internetwork Topology Using VIRL
    • Hacking Switches: Reviewing Ethernet Fundamentals
    • Hacking Switches: Demo
    • Hacking Switches: ARP Vulnerabilities and ARP Cache Poisoning
    • Reviewing Router Fundamentals
    • Examining ICMP, First Hop Redundancy and Routing Protocol Attacks
    • Hacking the Management Plane
    • Understanding Firewall Fundamentals and Levels of Inspection
    • Performing Firewall Reconnaissance and Tunneling
    • Lab: Using the traceroute Command
    • Surveying Essential Tools for Hacking Network Devices: Packet Capture
    • Surveying Essential Tools for Hacking Network Devices: Switch and Router Hacking Tools
    • Surveying Essential Tools for Hacking Network Devices: ARP Spoofing Tools
    • Surveying Essential Tools for Hacking Network Devices: MiTM Tools
    • Surveying Essential Tools for Hacking Network Devices: Linux Tools
    • Using Network Device Hacking Tools to Perform a MiTM Attack
    • Lesson 27: Flashcards
    • Lesson 27: Quiz
  • Lesson 28: Fundamentals of Wireless Hacking
    • Learning objectives
    • Reviewing Wireless Technology Fundamentals
    • Surveying Wireless Hacking Tools: Wireless Adapters
    • Surveying Wireless Hacking Tools: Software
    • Hacking WEP, WPA, and Other Protocols
    • Understanding Hacking Wireless Clients
    • Lesson 28: Flashcards
    • Lesson 28: Quiz
  • Lesson 29: Buffer Overflows
    • Learning objectives
    • Understanding Buffer Overflows
    • Exploiting Buffer Overflows
    • Overcoming Defenses for Buffer Overflow Vulnerabilities
    • Understanding Fuzzing
    • Creating a Fuzzing Strategy
    • Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers
    • Surveying Tools to Find and Exploit Buffer Overflows
    • Lesson 29: Flashcards
    • Lesson 29: Quiz
  • Lesson 30: Hacking User Credentials
    • Learning objectives
    • Understanding Authentication and Authorization Mechanisms
    • Understanding Authentication and Authorization Attacks
    • Exploring Password Storage Mechanisms
    • Lab: Configuring VLANs
    • Understanding Password Storage Vulnerability
    • Lab: Simulating an Eavesdropping Attack Using Wireshark
    • Cracking Passwords with John the Ripper
    • Cracking Passwords with hashcat
    • Lab: Finding the Physical Address of a LAN Adapter
    • Lab: Using Python for Penetration Testing
    • Improving Password Security
    • Lab: Detecting Rootkits
    • Lesson 30: Flashcards
    • Lesson 30: Quiz
  • Lesson 31: Social Engineering
    • Learning objectives
    • Understanding Social Engineering
    • Exploring the Social Engineering Toolkit (SET)
    • Exploring Maltego
    • Lab: Creating a Demilitarized Zone
    • Surveying Social Engineering Case Studies
    • Lab: Using Nikto
    • Lesson 31: Flashcards
    • Lesson 31: Quiz
  • Lesson 32: Writing Penetration Testing Reports
    • Learning objectives
    • Understanding Pen Test Reports and How They Are Used
    • Planning and Organizing Your Report
    • Understanding the Pen Test Report Format
    • Lab: Using Netcraft
    • Lab: Capturing and Exporting Data from Network Traffic Captured Using Wireshark
    • Exploring Risk Ratings
    • Lab: Using Ettercap for ARP Spoofing
    • Lab: Using OWASP ZAP
    • Lab: Making Syslog Entries Readable
    • Distributing Pen Test Reports
    • Lesson 32: Flashcards
    • Lesson 32: Quiz
  • Lesson 33: Wireless Client Attacks
    • Learning objectives
    • Understanding Wireless Client Attacks and Their Motives
    • Learning Packet Injection Attacks
    • Eavesdropping and Manipulating Unencrypted Wi-Fi Communications
    • Attacking Publicly Secure Packet Forwarding (PSPF)
    • Lab: Obtaining Information about UDP Settings, Configurations, and Ports
    • Lab: Creating a Personal Linux Firewall Using Iptables
    • Attacking the Preferred Network List (PNL)
    • Lesson 33: Flashcards
    • Lesson 33: Quiz
  • Lesson 34: Building Your Lab and Attack Hardware
    • Learning objectives
    • Understanding Wireless Antennas
    • Surveying Wi-Fi Devices Like the Pinneaple
    • Building Your Own Lab
    • Lesson 34: Flashcards
    • Lesson 34: Quiz
  • Lesson 35: Aircrack-ng
    • Learning objectives
    • Introducing the Aircrack-ng Suite
    • Introducing Airmon-ng
    • Understanding Airodump-ng
    • Lab: Configuring an SSL Cisco AnyConnect Secure Mobility Client VPN
    • Introducing Aireplay-ng
    • Lab: Installing Antivirus Software
    • Introducing Airdecap-ng
    • Introducing Airserv-ng
    • Introducing Airtun-ng
    • Lesson 35: Flashcards
    • Lesson 35: Quiz
  • Lesson 36: Cracking WEP
    • Learning objectives
    • Understanding WEP Fundamentals
    • Learning How to Crack WEP
    • Lab: Cracking a Linux Password Using John the Ripper
    • Lab: Using Nmap for Network Enumeration
    • Lesson 36: Flashcards
    • Lesson 36: Quiz
  • Lesson 37: Hacking WPA
    • Learning objectives
    • Understanding WPA Fundamentals
    • Surveying Attacks Against WPA2-PSK Networks
    • Using coWPAtty
    • Using Pyrit
    • Lab: Configuring Static Routing
    • Exploring WPA Enterprise Hacking
    • Lesson 37: Flashcards
    • Lesson 37: Quiz
  • Lesson 38: Performing Wireless Reconnaissance
    • Learning objectives
    • Using Kismet
    • Using Wireshark
    • Lab: Getting Information about DNS
    • Learning How to Hack Default Configurations
    • Lab: Using nslookup for Passive Reconnaissance
    • Lesson 38: Flashcards
    • Lesson 38: Quiz
  • Lesson 39: Evil Twins and Rogue Access Points
    • Learning objectives
    • Defining Evil Twin Attacks
    • Performing Evil Twin Attacks
    • Using Karmetasploit
    • Lab: Using the show ip route Command
    • Exploring the WiFi Pineapple
    • Lesson 39: Flashcards
    • Lesson 39: Quiz
  • Lesson 40: Mobile Device Security
    • Learning objectives
    • Understanding OWASP Mobile Device Vulnerabilities
    • Wrestling with the BYOD Dilemma
    • Understanding Mobile Device Management (MDM)
    • Lab: Testing Connectivity Using the Ping Command
    • Understanding Mobile Device Security Policies
    • Lesson 40: Flashcards
    • Lesson 40: Quiz
  • Lesson 41: Hacking Android Devices
    • Learning objectives
    • Exploring The Android Security Model
    • Exploring Android Emulators and SDK
    • Understanding Android Hacking Tools and Methodologies
    • Lab: Performing an Intense Scan in Zenmap
    • Lesson 41: Flashcards
    • Lesson 41: Quiz
  • Lesson 42: Hacking iOS Devices
    • Learning objectives
    • Introducing iOS Security
    • Exploring Jailbraking iOS
    • Surveying Tools for Dissasembling iOS Applications
    • Lesson 42: Flashcards
    • Lesson 42: Quiz
  • Lesson 43: Hacking IoT Devices
    • Learning objectives
    • Surveying Tools for Dissasembling iOS Applications
    • Exploring ZigBee and IEEE 802.15.4
    • Exploring INSTEON
    • Exploring ZWave
    • Exploring LoRA
    • Lesson 43: Flashcards
    • Lesson 43: Quiz
  • Lesson 44: Attacking Bluetooth
    • Learning objectives
    • Understanding Bluetooth Vulnerabilities
    • Surveying Tools for Bluetooth Monitoring
    • Lesson 44: Flashcards
    • Lesson 44: Quiz
  • Lesson 45: Attacking NFC
    • Learning objectives
    • Understanding NFC Vulnerabilities
    • Exploring NFC Attacks and Case Studies
    • Lab: Using ProDiscover Basic
    • Lesson 45: Flashcards
    • Lesson 45: Quiz
Add to cart form
$250

Everything you need

  • Video-based lessons (26 hours)
  • Interactive lab exercises
  • Self-study quizzes
  • 1-year access

Course experts

  • Omar Santos

    Best-selling Cisco Press author, expert trainer, and Principal Engineer at Cisco (PSIRT)

    Omar Santos

Recommended for you

Cybersecurity Foundations Training Course

$250.00