NDG Ethical Hacking

NDG Ethical Hacking, developed by NDG, focuses on one of the most challenging sectors of cybersecurity. This series of labs is designed to provide hands-on experience conducting a variety of ethical hacking practices. These skills can help prepare trainees for a variety of IT positions, including: Cyber Security Analyst, Penetration Tester, Ethical Hacker-Security Engineer IT Security Specialist, Cyber Security Engineer and Information Security Engineer-Ethical Hacker.

Lab List

Lab Title Certified Ethical Hacking (CEH) Domains Offensive Security (PWK) Objectives SANS GPEN Objectives
1 Reconnaissance with Nmap & Amap
  • 2: Footprinting and Reconnaissance
  • 3: Scanning Networks
  • 3: The Essential Tools (netcat, ncat, wireshark, tcpdump)
  • 6: Trojans and Backdoors
  • 7: Intel Target Scanning
  • 15: Scanning for Targets
2 Social Engineering Attacks with Social Engineering Toolkit
  • 9: Social Engineering
  • 14: Reconnaissance
3 Metasploit Framework Fundamentals
  • 5: System Hacking
  • 17: Metasploit Framework
  • 8: Metasploit
4 Web Pentesting with Nikto & OWASP Zap
  • 12: Hacking Webservers
  • 13: Hacking Web Applications
  • 14: Web Application Attacks
  • 6: General Web Application Probing
5 Password Cracking with John the Ripper and Hashcat
  • 5: System Hacking
  • 18: Cryptography
  • 15: Password Attacks
  • 1: Advanced Password Attacks
  • 2: Attacking Password Hashes
  • 10: Password Attacks
6 Creating and Installing SSL Certificates
  • 18: Cryptography
  • 18: Wireless Crypto and Client Attacks
7 Vulnerability Scanning with OpenVAS
  • 3: Scanning Networks
  • 16: Vulnerability Scanning
8 Enumerating SMB with enum4linux
  • 4: Enumeration
  • 12: Privilege Escalation
  • 4: Enumerating Users
9 Backdooring with Netcat
  • 5: System Hacking
  • 9: Moving Files with Exploits
10 Packet Crafting with Scapy
  • 5: Exploitation Fundamentals
11 Network Analysis
  • 8: Sniffers
  • 3: The Essential Tools (netcat, ncat, wireshark, tcpdump)
12 Client Side Exploitations
  • 13: Hacking Web Applications
  • 13: Client Side Attacks
  • 6: General Web Application Probing
13 Testing Firewall Rules with Firewalking
  • 16: Evading IDS, Firewalls and Honeypots
14 Understanding SQL Commands & Injections
  • 14: SQL Injection
  • 14: Reconnaissance
15 Understanding Buffer Overflows
  • 17: Buffer Overflow
  • 7: Buffer Overflows
  • 5: Exploitation Fundamentals
16 Evading IDS
  • 16: Evading IDS, Firewalls and Honeypots
17 Packet Crafting with Hping
  • 5: Exploitation Fundamentals
18 VNC as a Backdoor
  • 5: System Hacking
19 Auditing Linux Systems
  • 13: Pentesting via the Command Line
20 Anti-Virus Evasion
  • 6: Trojans and Backdoors