{"id":248,"date":"2025-07-31T02:19:18","date_gmt":"2025-07-31T02:19:18","guid":{"rendered":"https:\/\/student.wp.odu.edu\/zabeb001\/?page_id=248"},"modified":"2025-07-31T08:15:31","modified_gmt":"2025-07-31T08:15:31","slug":"ethical-hacking-and-penetration-testing","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/zabeb001\/ethical-hacking-and-penetration-testing\/","title":{"rendered":"Ethical Hacking and Penetration Testing"},"content":{"rendered":"\n<p><strong>Course Overview<\/strong><\/p>\n\n\n\n<p>In this course, I learned how to think like a hacker to better protect systems. I used tools like Kali Linux, Metasploit, and Wireshark to find and test system weaknesses in a safe and legal way. The class covered many topics, including threat modeling, password cracking, SQL injection, and steganography. I also practiced writing scripts and reports, which helped me build real skills I can use in cybersecurity jobs.<\/p>\n\n\n\n<p><strong>Labs<\/strong><\/p>\n\n\n\n<p>Here are a few examples of the labs I completed in this class:<\/p>\n\n\n\n<ul>\n<li><a href=\"http:\/\/student.wp.odu.edu\/zabeb001\/wp-content\/uploads\/sites\/35306\/2025\/07\/Active-and-Vulnerability-Scanning.pdf\">Active Reconnaissance and Vulnerability Scanning<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/student.wp.odu.edu\/zabeb001\/wp-content\/uploads\/sites\/35306\/2025\/07\/Malware-Analysis.pdf\">Malware Analysis<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/student.wp.odu.edu\/zabeb001\/wp-content\/uploads\/sites\/35306\/2025\/07\/SQL-Injection-Attack.pdf\">SQL Injection Attack<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Course Overview In this course, I learned how to think like a hacker to better protect systems. I used tools like Kali Linux, Metasploit, and Wireshark to find and test system weaknesses in a safe and legal way. The class covered many topics, including threat modeling, password cracking, SQL injection, and steganography. I also practiced&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/student.wp.odu.edu\/zabeb001\/ethical-hacking-and-penetration-testing\/\">Read More<\/a><\/div>\n","protected":false},"author":28351,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/pages\/248"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/users\/28351"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/comments?post=248"}],"version-history":[{"count":3,"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/pages\/248\/revisions"}],"predecessor-version":[{"id":379,"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/pages\/248\/revisions\/379"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/media?parent=248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}