Intermediate Ethical Hacking Hands-on Training
$5.00
Price: 5.00 USD | Size:5.79 GB | Duration : 8.27 Hours | 50 Lessons | ⭐️⭐️⭐️⭐️⭐️ 4.8
BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD
Description
Price: 5.00 USD | Size:5.79 GB | Duration : 8.27 Hours | 50 Lessons | ⭐️⭐️⭐️⭐️⭐️ 4.8
BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD
Intermediate Ethical Hacking Hands-on Training Online Course
What you’ll learn
Web Application Attacks
Wireless Network Attacks
Python scripting for pentesters
Advance Hacking Methodologies
Requirements
Completion of an introductory course to ethical hacking or pentesting.
Or completing Ethical Hacking – Hands-On Training Part I.
Above average use of the Kali CLI
Good troubleshooting skills
Description
Alert –
Intermediate Ethical Hacking Hands-on Training is a continuation of Ethical Hacking – Hands-on Training Part I. Before taking this course, students should have completed an introduction to an ethical hacking or pentesting course. Students should have completed Ethical Hacking – Hands-on Training Part I for best results before signing up for the intermediate course.
Intermediate Ethical Hacking Hands-on Training picks up where Part I leaves off. In Part I, students was taught the fundamentals of pentesting while being introduced to some basic skills.
Intermediate Ethical Hacking Hands-On Training provides an intermediate level of white, grey, and black hat skills every cybersecurity professional needs to know. In addition, advanced reconnaissance techniques are taught using the NMap scripting engine and various hacking tools used by pentesters.
Sections include Web Application Attacks, Wireless Network Attacks, PowerShell Empire, Netcat, and Wireshark Fundamentals.
For the best experience in learning to be an ethical hacker or pentester, students should complete the instructor’s complete series on ethical hacking, starting with Ethical Hacking Hands-On Training Part I and proceeding to this intermediate course.
The three Ethical Hacking Capture the Flag Courses are the capstone series where students apply and use all the techniques taught in the two Ethical hacking courses.
By the end of the course, you will have a deep understanding of external and internal network penetration testing, wireless penetration testing, and web application penetration testing. The lab exercises in the course are based on real-world application of Red Team best practices.
Who this course is for:
Those wanting to learning the intermediate skills of pentesting.
01.01-course overview
02.01-downloading iso and ova file for virtualbox
02.02-create a virtual install of kali using virtualbox
02.03-create a virtual install of metasploitable2
02.04-creating windows 7 pro target machine using virtualbox
02.05-installing the virtualbox extension pack
03.01-installing the webmap-nmap dashboard
03.02-automated reconenumeration using nmapautomator
04.01-create a reverse shell using command injection
04.02-create a reverse shell using a file upload
04.03-launch an automated meterpreter session
04.04-upgrade a dumb terminal to fully functional bash shell
04.05-windows 7 privilege escalation using uac bypass
04.06-creating a persistent backdoor using a persistent service
05.01-create virtual install of server 2016 full gui using virtualbox
05.02-preparing your server 2016 target
05.03-promote server 2016 to a domain controller
05.04-installing powershell empire on kali linux
05.05-enumerating active directory
05.06-post-exploitation of windows using powershell empire
06.01-advanced password hacking with metasploit
06.02-post-exploitation of microsoft windows
06.03-brute force the smb password on a windows server
06.04-enumerating active directory using rpcclient
06.05-dumping wi-fi credentials using netsh
07.01-heartbleed openssl exploit vulnerability
07.02-performing an rdp brute force attack
07.03-exploiting active directory using llmnrnbt-ns poisoning
07.04-accessing kali across the wan with ngrok
07.05-pentesting with netcat
07.06-enumerate dns records using dnsrecon
08.01-installing a wireless adapter in kali
08.02-j hacking a wireless network using kali linux
08.03-wireless deauthentication attack
08.04-pmkid client-less wireless attack using bettercap
09.01-overview of wireshark 3.2
09.02-wireshark capture options
09.03-wireshark toolbar icons
09.04-capturing wireless traffic using wireshark
09.05-capturing a 3-way tcp handshake using wireshark
10.01-creating a virtual install of owasp
10.02-setting up burp suite
10.03-attack web apps with burp suite using sql injection
10.04-os command injection using commix 3.2x
10.05-web application firewall detection using wafw00f
10.06-exploit vulnerable web applications using command injection
10.07-using banner grabbing to aid in reconnaissance
11.01-anonymize kali using whonix
12.01-lab preparation for ctf sql injection to shell
12.02-ctf walkthrough for sql injection to shell
978180324×390 Code.zip
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.