Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Be A White Hat Hacker And Pen Tester

Posted By: ELK1nG
Be A White Hat Hacker And Pen Tester

Be A White Hat Hacker And Pen Tester
Last updated 12/2018
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 662.52 MB | Duration: 4h 16m

Learn Ethical Hacking Concepts To Master Practical White Hat Hacking Techniques and Pen Testing

What you'll learn

Master Ethical Hacking

Apply concepts learnt to ethically hack Systems and Networks

Understand Security Paradigms and will be able to create more secure systems and software

Act as a security and Pen testing consultant

Requirements

Students should have some background in testing and knowledge of web servers, networks and web technologies

Description

Become a white hat hacker and learn all the practical techniques for penetration testing with this amazing course which will provide conceptual framework to your security training. The course not only covers theoretical concepts but cover the practical demonstrations of various tools like Metaspoilt, Scapy and WireShark.
The course is divided into the following main sections:
Ethical Hacking Concepts
-What is Ethical Hacking? Know about different types of hackers. Get to know about hacktivism and practical pen testing techniques
Real World Information Gathering
-Learn about foot printing and reconnaissance, Email harvesting, Learn and master SSL scan, Maltego, Whatweb, HttpRecon. Work on techniques like IP address geolocation, DNS and Mail Server Enumeration
Scanning and Vulnerability Gathering
-Learn to use scapy for packet crafting and port scanning, Learn to use network scanning techniques and work on vulnerability identification
Network Attacking Techniques
Master techniques for password cracking, MITM, Sniffing SSL and RDP attacks
Web Exploitation Techniques
Learn about password attacks, SQL Injections, RCE and DOS attacks
Wireless Network Security
Standards in Wireless security, WEP encryption, Wireless sniffing, Protecting Wireless networks
Metaspoilt
Learn to use the metaspoilt tool for your projects
Detection Evasion
Learn about the detection evasion techniques
This exhaustive course covers everything you need to know about white hat hacking. Get the Knowledge, Get the Expertise.

Overview

Section 1: Introduction To Ethical Hacking

Lecture 1 Introduction

Section 2: Introduction to Ethical hacking and Penetration testing

Lecture 2 Ethical hacking and Penetration testing

Section 3: Real World information gathering

Lecture 3 Real World information gathering - Information Intelligence Techniques

Lecture 4 Maltego -Demo

Lecture 5 Real World information gathering - Search Engines

Lecture 6 Real World information gathering - Web Application Firewall Detection

Section 4: Scanning and Vulnerability gathering

Lecture 7 Scanning and Vulnerability gathering - Scapy

Lecture 8 Scanning and Vulnerability gathering - Vulnerability Assesment

Lecture 9 Scanning and Vulnerability gathering - Practical Avoidance Techniques

Section 5: Network attacking techniques

Lecture 10 Network attacking techniques

Lecture 11 Wifi hack Demo

Section 6: Desktop Hacking Techniques

Lecture 12 Desktop hacking techniques

Lecture 13 Desktop hacking techniques - Hacking Different Systems

Section 7: Web Exploitation Techniques

Lecture 14 Web Exploitation - Basic Techniques

Lecture 15 Web Testing Tools

Lecture 16 Exploiting and Counter Measures

Section 8: Wireless network Security

Lecture 17 Wireless network Security - Wireless networks and Standards

Lecture 18 Wireless network Security - Breaking WEP Encryption

Lecture 19 Wireless network Security - Wireless Sniffing

Section 9: Metasploit

Lecture 20 Metasploit - Introduction

Lecture 21 Metasploit - Advance Metaspoilt Concepts

Lecture 22 Metasploit - Practical Usage

Section 10: Detection Evasion

Lecture 23 Detection Evasion

Section 11: Summary

Lecture 24 Course Summary

Lecture 25 Bonus Lecture: More Interesting Stuff, Offers and Discounts

Students who want to be system security professionals,Students who want to learn Ethical Hacking