Be A White Hat Hacker And Pen Tester
Last updated 12/2018
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 662.52 MB | Duration: 4h 16m
Last updated 12/2018
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 662.52 MB | Duration: 4h 16m
Learn Ethical Hacking Concepts To Master Practical White Hat Hacking Techniques and Pen Testing
What you'll learn
Master Ethical Hacking
Apply concepts learnt to ethically hack Systems and Networks
Understand Security Paradigms and will be able to create more secure systems and software
Act as a security and Pen testing consultant
Requirements
Students should have some background in testing and knowledge of web servers, networks and web technologies
Description
Become a white hat hacker and learn all the practical techniques for penetration testing with this amazing course which will provide conceptual framework to your security training. The course not only covers theoretical concepts but cover the practical demonstrations of various tools like Metaspoilt, Scapy and WireShark.
The course is divided into the following main sections:
Ethical Hacking Concepts
-What is Ethical Hacking? Know about different types of hackers. Get to know about hacktivism and practical pen testing techniques
Real World Information Gathering
-Learn about foot printing and reconnaissance, Email harvesting, Learn and master SSL scan, Maltego, Whatweb, HttpRecon. Work on techniques like IP address geolocation, DNS and Mail Server Enumeration
Scanning and Vulnerability Gathering
-Learn to use scapy for packet crafting and port scanning, Learn to use network scanning techniques and work on vulnerability identification
Network Attacking Techniques
Master techniques for password cracking, MITM, Sniffing SSL and RDP attacks
Web Exploitation Techniques
Learn about password attacks, SQL Injections, RCE and DOS attacks
Wireless Network Security
Standards in Wireless security, WEP encryption, Wireless sniffing, Protecting Wireless networks
Metaspoilt
Learn to use the metaspoilt tool for your projects
Detection Evasion
Learn about the detection evasion techniques
This exhaustive course covers everything you need to know about white hat hacking. Get the Knowledge, Get the Expertise.
Overview
Section 1: Introduction To Ethical Hacking
Lecture 1 Introduction
Section 2: Introduction to Ethical hacking and Penetration testing
Lecture 2 Ethical hacking and Penetration testing
Section 3: Real World information gathering
Lecture 3 Real World information gathering - Information Intelligence Techniques
Lecture 4 Maltego -Demo
Lecture 5 Real World information gathering - Search Engines
Lecture 6 Real World information gathering - Web Application Firewall Detection
Section 4: Scanning and Vulnerability gathering
Lecture 7 Scanning and Vulnerability gathering - Scapy
Lecture 8 Scanning and Vulnerability gathering - Vulnerability Assesment
Lecture 9 Scanning and Vulnerability gathering - Practical Avoidance Techniques
Section 5: Network attacking techniques
Lecture 10 Network attacking techniques
Lecture 11 Wifi hack Demo
Section 6: Desktop Hacking Techniques
Lecture 12 Desktop hacking techniques
Lecture 13 Desktop hacking techniques - Hacking Different Systems
Section 7: Web Exploitation Techniques
Lecture 14 Web Exploitation - Basic Techniques
Lecture 15 Web Testing Tools
Lecture 16 Exploiting and Counter Measures
Section 8: Wireless network Security
Lecture 17 Wireless network Security - Wireless networks and Standards
Lecture 18 Wireless network Security - Breaking WEP Encryption
Lecture 19 Wireless network Security - Wireless Sniffing
Section 9: Metasploit
Lecture 20 Metasploit - Introduction
Lecture 21 Metasploit - Advance Metaspoilt Concepts
Lecture 22 Metasploit - Practical Usage
Section 10: Detection Evasion
Lecture 23 Detection Evasion
Section 11: Summary
Lecture 24 Course Summary
Lecture 25 Bonus Lecture: More Interesting Stuff, Offers and Discounts
Students who want to be system security professionals,Students who want to learn Ethical Hacking