The Practical Ethical Hacking course by The Cyber Mentor.
I have purchased this course from TCM-Security website. I am still pretty early in this course but as I work my way through this course I will update this blog. My first impressions of this course is it is laid out very nice. it is structured and broken down into the basics and progresses through the course. You start off with introductions and note taking, next you move onto a networking refresher and this was just that a refresher. I already have my CCNA so this was just a slight review on the basics of the OSI model and topics like subnetting and protocols such as TCP and UDP.
Then the course moves onto setting up your lab environment which I have a lot of experience in as I have installed Virtual Box on my desktop as well as my laptop and have several VM’s running multiple operating systems for training such as Windows 10, Windows Server 2016, Kali Linux, CentOS and Ubuntu.
I have downloaded and installed many different iso files. Next the course moves into teaching you Linux. This was also a nice refresher and some more practice navigating the file system, creating bash scripts and practicing using common networking commands.
The course next moves into learning Python. This is also a refresher for me and some good practice as I am familiar with Python mainly for scripting and writing simple coding games when I was learning Python with Codecademy as well as building a script to change a MAC address and building a port scanner.
The course then moves onto the five stages of Ethical Hacking which is where I am currently studying. Reconnaissance, scanning and enumeration, gaining access or exploitation, maintaining access and lastly covering your tracks.