{"id":11690,"date":"2024-07-17T15:28:20","date_gmt":"2024-07-17T13:28:20","guid":{"rendered":"https:\/\/www.answerthecall.co.za\/learning\/?post_type=lp_course&#038;p=11690"},"modified":"2024-07-18T12:45:17","modified_gmt":"2024-07-18T10:45:17","slug":"ethical-hacker","status":"publish","type":"lp_course","link":"https:\/\/www.answerthecall.co.za\/learning\/course\/ethical-hacker\/","title":{"rendered":"Ethical Hacker"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11690\" class=\"elementor elementor-11690\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-915a9ae elementor-section-boxed elementor-section-height-default elementor-section-height-default exad-glass-effect-no exad-sticky-section-no\" data-id=\"915a9ae\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9fc6b4b exad-glass-effect-no exad-sticky-section-no\" data-id=\"9fc6b4b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-481b237 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"481b237\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><strong>Course Description:<\/strong><\/p><p>The digital landscape is evolving at an unprecedented rate and cyber threats lurk around every corner. Cybersecurity resilience in the modern world cannot be just an add on &#8211; it&#8217;s a necessity. Offensive security professionals like ethical hackers and penetration testers can help proactively discover unknown threats and address them before the cybercriminals do.<br \/>This course is designed to prepare you with an Ethical Hacker skillset and give you a solid understanding of offensive security. You will become proficient in the art of scoping, executing, and reporting on vulnerability assessments, while recommending mitigation strategies. Follow an engaging gamified narrative throughout the course and get lots of practice with hands-on labs inspired by real-world scenarios.<br \/>After completing this course, continue your cybersecurity career in offensive security as an ethical hacker or penetration tester. Or use this course to strengthen your defensive security knowledge. By understanding the mindset of threat actors, you will be able to more effectively implement security controls and monitor, analyze, and respond to current security threats.<\/p><p><strong>What Skills Will You Learn?<\/strong><\/p><ul><li>You can classify pentesting tools by use case.<\/li><li>You can create a penetration testing report.<\/li><li>You can explain how to perform post-exploitation activities.<\/li><li>You can explain how to exploit cloud, mobile, and IoT security vulnerabilities.<\/li><li>You can explain how to exploit application-based vulnerabilities.<\/li><li>You can explain how to exploit wired and wireless network vulnerabilities.<\/li><li>You can explain how social engineering attacks succeed.<\/li><li>You can perform information gathering and vulnerability scanning activities.<\/li><li>You can create penetration testing preliminary documents.<\/li><li>You can explain the importance of methodological ethical hacking and penetration testing.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4e3a30f elementor-section-boxed elementor-section-height-default elementor-section-height-default exad-glass-effect-no exad-sticky-section-no\" data-id=\"4e3a30f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-65642bd exad-glass-effect-no exad-sticky-section-no\" data-id=\"65642bd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3202361 elementor-widget__width-initial exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"3202361\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.answerthecall.co.za\/learning\/wp-content\/uploads\/2024\/05\/3d237b16-c5c6-4650-918d-6b7b6dfe6ddd.png\" class=\"attachment-large size-large wp-image-10328\" alt=\"\" srcset=\"https:\/\/www.answerthecall.co.za\/learning\/wp-content\/uploads\/2024\/05\/3d237b16-c5c6-4650-918d-6b7b6dfe6ddd.png 600w, https:\/\/www.answerthecall.co.za\/learning\/wp-content\/uploads\/2024\/05\/3d237b16-c5c6-4650-918d-6b7b6dfe6ddd-300x300.png 300w, https:\/\/www.answerthecall.co.za\/learning\/wp-content\/uploads\/2024\/05\/3d237b16-c5c6-4650-918d-6b7b6dfe6ddd-150x150.png 150w, https:\/\/www.answerthecall.co.za\/learning\/wp-content\/uploads\/2024\/05\/3d237b16-c5c6-4650-918d-6b7b6dfe6ddd-100x100.png 100w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c25c2ed exad-glass-effect-no exad-sticky-section-no\" data-id=\"c25c2ed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Course Description:<br \/>\nThe digital landscape is evolving at an unprecedented rate and cyber threats lurk around every corner. Cybersecurity resilience in the modern world cannot be just an add on &#8211; it&#8217;s a necessity. Offensive security professionals like ethical hackers <\/p>\n","protected":false},"author":3,"featured_media":9871,"comment_status":"open","ping_status":"closed","template":"","course_category":[28,39],"course_tag":[121],"class_list":["post-11690","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course_category-cybersecurity","course_category-ict-skills","course_tag-hacking","pmpro-has-access","course"],"_links":{"self":[{"href":"https:\/\/www.answerthecall.co.za\/learning\/wp-json\/wp\/v2\/lp_course\/11690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.answerthecall.co.za\/learning\/wp-json\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/www.answerthecall.co.za\/learning\/wp-json\/wp\/v2\/types\/lp_course"}],"author":[{"embeddable":true,"href":"https:\/\/www.answerthecall.co.za\/learning\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.answerthecall.co.za\/learning\/wp-json\/wp\/v2\/comments?post=11690"}],"version-history":[{"count":14,"href":"https:\/\/www.answerthecall.co.za\/learning\/wp-json\/wp\/v2\/lp_course\/11690\/revisions"}],"predecessor-version":[{"id":11910,"href":"https:\/\/www.answerthecall.co.za\/learning\/wp-json\/wp\/v2\/lp_course\/11690\/revisions\/11910"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.answerthecall.co.za\/learning\/wp-json\/wp\/v2\/media\/9871"}],"wp:attachment":[{"href":"https:\/\/www.answerthecall.co.za\/learning\/wp-json\/wp\/v2\/media?parent=11690"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/www.answerthecall.co.za\/learning\/wp-json\/wp\/v2\/course_category?post=11690"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/www.answerthecall.co.za\/learning\/wp-json\/wp\/v2\/course_tag?post=11690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}