Welcome to Expert Training The Online Course Shop!
-67%

Intermediate Ethical Hacking Hands-on Training

$5.00

Price: 5.00 USD | Size:5.79 GB | Duration : 8.27 Hours | 50 Lessons |  ⭐️⭐️⭐️⭐️⭐️ 4.8    

BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

SKU: NTR-THC-HCK-HND Category:

OR

Add to Wishlist
Add to Wishlist

Description

Price: 5.00 USD | Size:5.79 GB | Duration : 8.27 Hours | 50 Lessons |  ⭐️⭐️⭐️⭐️⭐️ 4.8    

BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

Intermediate Ethical Hacking Hands-on Training Online Course

What you’ll learn

 

Web Application Attacks

Wireless Network Attacks

Python scripting for pentesters

Advance Hacking Methodologies

Requirements

Completion of an introductory course to ethical hacking or pentesting.

Or completing Ethical Hacking – Hands-On Training Part I.

Above average use of the Kali CLI

Good troubleshooting skills

Description

Alert –

Intermediate Ethical Hacking Hands-on Training is a continuation of Ethical Hacking – Hands-on Training Part I. Before taking this course, students should have completed an introduction to an ethical hacking or pentesting course. Students should have completed Ethical Hacking – Hands-on Training Part I for best results before signing up for the intermediate course.

Intermediate Ethical Hacking Hands-on Training picks up where Part I leaves off. In Part I, students was taught the fundamentals of pentesting while being introduced to some basic skills.

Intermediate Ethical Hacking Hands-On Training provides an intermediate level of white, grey, and black hat skills every cybersecurity professional needs to know. In addition, advanced reconnaissance techniques are taught using the NMap scripting engine and various hacking tools used by pentesters.

Sections include Web Application Attacks, Wireless Network Attacks, PowerShell Empire, Netcat, and Wireshark Fundamentals.

For the best experience in learning to be an ethical hacker or pentester, students should complete the instructor’s complete series on ethical hacking, starting with Ethical Hacking Hands-On Training Part I and proceeding to this intermediate course.

The three Ethical Hacking Capture the Flag Courses are the capstone series where students apply and use all the techniques taught in the two Ethical hacking courses.

By the end of the course, you will have a deep understanding of external and internal network penetration testing, wireless penetration testing, and web application penetration testing. The lab exercises in the course are based on real-world application of Red Team best practices.

Who this course is for:

Those wanting to learning the intermediate skills of pentesting.

01.01-course overview

02.01-downloading iso and ova file for virtualbox

02.02-create a virtual install of kali using virtualbox

02.03-create a virtual install of metasploitable2

02.04-creating windows 7 pro target machine using virtualbox

02.05-installing the virtualbox extension pack

 

03.01-installing the webmap-nmap dashboard

03.02-automated reconenumeration using nmapautomator

 

04.01-create a reverse shell using command injection

04.02-create a reverse shell using a file upload

04.03-launch an automated meterpreter session

04.04-upgrade a dumb terminal to fully functional bash shell

04.05-windows 7 privilege escalation using uac bypass

04.06-creating a persistent backdoor using a persistent service

 

05.01-create virtual install of server 2016 full gui using virtualbox

05.02-preparing your server 2016 target

05.03-promote server 2016 to a domain controller

05.04-installing powershell empire on kali linux

05.05-enumerating active directory

05.06-post-exploitation of windows using powershell empire

 

06.01-advanced password hacking with metasploit

06.02-post-exploitation of microsoft windows

06.03-brute force the smb password on a windows server

06.04-enumerating active directory using rpcclient

06.05-dumping wi-fi credentials using netsh

 

07.01-heartbleed openssl exploit vulnerability

07.02-performing an rdp brute force attack

07.03-exploiting active directory using llmnrnbt-ns poisoning

07.04-accessing kali across the wan with ngrok

07.05-pentesting with netcat

07.06-enumerate dns records using dnsrecon

 

08.01-installing a wireless adapter in kali

08.02-j hacking a wireless network using kali linux

08.03-wireless deauthentication attack

08.04-pmkid client-less wireless attack using bettercap

 

09.01-overview of wireshark 3.2

09.02-wireshark capture options

09.03-wireshark toolbar icons

09.04-capturing wireless traffic using wireshark

09.05-capturing a 3-way tcp handshake using wireshark

 

10.01-creating a virtual install of owasp

10.02-setting up burp suite

10.03-attack web apps with burp suite using sql injection

10.04-os command injection using commix 3.2x

10.05-web application firewall detection using wafw00f

10.06-exploit vulnerable web applications using command injection

10.07-using banner grabbing to aid in reconnaissance

 

11.01-anonymize kali using whonix

 

12.01-lab preparation for ctf sql injection to shell

12.02-ctf walkthrough for sql injection to shell

978180324×390 Code.zip

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Quick Navigation
×
×

Cart