Setup Menus in Admin Panel

  • LOGIN
  • No products in the cart.

Course Name: Ultimate Ethical Hacking & Penetration Testing Course 2017

Descriptions

Course Curriculum

Section 1: Introduction to penetration testing and ethical hacking
Introduction 00:00:00
Section 2: Building your penetration testing Box (LAB)
Setting-up OWASP bwa VM 00:00:00
Setting-up KALI LINUX VM 00:00:00
Setting-up Metasploitable 00:00:00
Setting-up Windows VM 00:00:00
Section 3: Penetration Testing methodologies
Penetration Testing Methodologies 00:00:00
Section 4: Passive Discovery - Open Source Intelligence gathering
Open source intelligence gathering – Basics 00:00:00
Open source intelligence gathering – Recon-ng 00:00:00
Open source intelligence gathering – DiscoverScript 00:00:00
Open-source intelligence gathering – Spiderfoot 00:00:00
Section 5: Active Discovery - Reconnaissance
Active Reconnaissance with Sparta 00:00:00
Scanning Entire network in 6 minutes 00:00:00
Taking massive snapshot of web 00:00:00
Section 6: Vulnerability Assessments
Vulnerability Assessment – Nessus 00:00:00
Vulnerability Assessment – OpenVAS 00:00:00
Vulnerability Assessment – Nikto 00:00:00
Quick findings of web apps vulnerabilities 00:00:00
Web application scanning – ZAP 00:00:00
ZAP scan analysis 00:00:00
Web Application Scanning – AppSpider Pro 00:00:00
Section 7: Vulnerability to Exploitation - Exploiting the targets
Metasploit Commanding 00:00:00
Metasploit – Exploiting MS08-067 00:00:00
Metasploit – Exploiting Web Apps 00:00:00
Binary Exploitation – Buffer Overflow Attack 00:00:00
Browser Exploitation with BeEF 00:00:00
Section 8: Web application Penetration testing - Exploitation
Exploiting SQL Injection 00:00:00
Cross Site Scripting Attacks – XSS 00:00:00
Cross Site Request Forgery Attack – CSRF 00:00:00
Fuzzing Input fields 00:00:00
Section 9: Wireless Network Hacking
WPA-WPA2 Cracking ( wireless security testing ) 00:00:00
Section 10: Post Exploitation attacks - Lateral Moving in Networks
First post Responder 00:00:00
Adding user account to target machine 00:00:00
Creating persistent backdoor on target machine 00:00:00
Msfvenom-msfpc with RC scripts 00:00:00
Dumping cached credentials ( last 10 passwords ) 00:00:00
Section 11: Antivirus Firewalls IDS EVASION
Firewall Evasion with NMAP 00:00:00
Content filter bypass with metasploit 00:00:00
Veil Evasion framework (Evading Anti-viruses) 00:00:00
Section 12: Password Cracking and Exploits
Windows Password cracking – KON BOOT 00:00:00
Linux Password Hash cracking – jtr 00:00:00
Generating alpha-numeric passwords lists 00:00:00
Generating Passwords lists from target sites 00:00:00
Section 13: EXPLOITS AND VULNERABILITY SEARCH
Search Sploit in kali 00:00:00
Exploits search in bugtraq 00:00:00
Exploits in EXPLOIT-DB 00:00:00
Section 14: ANONYMITY
Being anonymous & safe internet 00:00:00
Section 15: MY PENETRATION TESTING TIPS
Best Commercial Tools 00:00:00
Top Security Conferences & magazine 00:00:00
Bug Bounty programmes 00:00:00
Section 16: BONUS LECTURE
THE DARKNET – Deep web links (Dark side of the internet) 00:00:00
Online Learning Thailand.
X