Hack Like A White Hat Hacker - A Practical Introduction

Posted By: ELK1nG

Hack Like A White Hat Hacker - A Practical Introduction
Published 11/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 564.10 MB | Duration: 0h 36m

Decide if penetration testing is the right job for you, based on insights from a professional white hat hacker.

What you'll learn

Witness a practical penetration testing example from a professional penetration tester

Get motivated about starting a career as a penetration tester

Gain an initial view of penetration tester

Learn the different steps of a penetration testing mission

Requirements

No prior requirements are needed for this course

Description

Welcome to this course that will demystify the exciting job of a white hat hacker, and help you decide if it's worth pursuing! If you're curious about penetration testing, cybersecurity, but now little to nothing about it, you're in the right place.I will take you through a practical use case approach. Rather than inundating you with theoretical jargon, I will immerse you in a practical use case where you'll have a peek behind the curtain. You will discover different tools, vulnerabilities, and how to use them to hack a web application.Starting from the very first kickoff meeting and progressing through the various stages that define a pentest mission, this course will offer you valuable insights into the fundamental building blocks of a pentest job. We will take you on a journey through the mission, immersing you in the real-world experiences of a white hat hacker's job. Upon completing this course, you will possess the knowledge and experience necessary to make an informed decision about whether a career in penetration testing aligns with your aspirations. This course will help you evaluate whether a job in this field resonates with your interests and goals.The sole purpose of this course is to introduce penetration testing, it is NOT intended for those who want to build their technical skills.

Overview

Section 1: Introduction

Lecture 1 Welcome to the course

Section 2: Pentest mission planning

Lecture 2 Agenda for the pentest mission

Lecture 3 Kickoff meeting

Lecture 4 Engagement plan

Section 3: Enumeration

Lecture 5 Port scanning

Lecture 6 Service fingerprinting

Lecture 7 Application mapping

Lecture 8 SSH interaction

Lecture 9 Attack plan

Section 4: Exploitation

Lecture 10 Cross-Site scripting

Lecture 11 Local file inclusion

Lecture 12 SQL injection

Lecture 13 Password cracking

Lecture 14 Remote shell access

Section 5: Privilege escalation

Lecture 15 Post-exploitation enumeration

Lecture 16 Privilege escalation

Section 6: Additional considerations

Lecture 17 Audit trails

Lecture 18 Become a penetration tester like me

Students who don't know if penetration testing is the right career for them,Anyone who want to switch to cybersecurity but are not sure if it's worth the jump,Curious minds who want to discover the offensive side of cybersecurity