Get $1 credit for every $25 spent!

The 2023 Complete Cyber Security Ethical Hacking Certification Bundle

Ending In:
Add to Cart - $34.99
Add to Cart ($34.99)
$2,000
98% off
wishlist
Courses
10
Lessons
1,276

What's Included

Product Details

Access
Lifetime
Content
28.0 hours
Lessons
148

Learn Ethical Hacking: Beginner to Advanced

Hone Your Ethical Hacking, Penetration Testing & Network Security Skills

By Joseph Delgadillo | in Online Courses

If you would like to master ethical hacking and get a job in the field of cyber security, you are going to LOVE this course! Learn ethical hacking, penetration testing, Kali Linux, and Python hacking with over 28 hours of HD video tutorials! This course was designed to be extremely beginner friendly. We will begin by covering how to set up a secure and anonymous pentesting environment, cover essential hacking tools in Kali Linux and finish up with writing our own tools in Python. This course even includes a complete Python crash course, so no previous programming experience is necessary!

4.5/5 average rating: ★ ★ ★ ★

  • Access 148 lectures & 28 hours of content 24/7
  • Set up a Kali Linux system
  • Learn essential Linux system commands
  • Create a secure penetration testing environment
  • Study wireless network security & how to hack WiFi
  • Learn system hacking using Metasploit
  • Write your own pen testing tools

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Joseph Delgadillo | Best-Selling Instructor
4.2/5 Instructor Rating: ★ ★ ★ ★

Joseph Delgadillo teaches skills ranging from computers and technology to entrepreneurship and digital marketing. Take a course with him to get an over-the-shoulder view of how experts are successful in their respective fields. He is a proud alumnus of Central Washington University.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Your First Program
  • Introduction and Installation
    • Introduction - 4:40
    • VirtualBox installation - 15:36
    • Kali Linux installation - 13:54
    • Enabling full screen - 18:16
  • Basic Linux Commands
    • Basic Linux commands part 1 - 9:41
    • Basic Linux commands part 2 - 21:04
    • Basic Linux commands part 3 - 12:45
  • Creating a Secure Hacking Environment
    • Changing IP addresses and wireless adapter setup - 4:51
    • Creating a bootable Kali USB drive - 4:54
    • Important networking terms - 10:15
    • Important hacking terms - 17:58
    • Few things to do after installing Kali Linux - 8:30
    • Changing our mac address with macchanger - 6:24
  • Footprinting
    • Google hacking - 13:08
    • Nikto basics - 10:55
    • Whois tool - 6:39
    • Email harvesting - 6:07
    • Shodan - 10:24
    • Zone transfer with dig - 7:08
  • Scanning
    • Installing Metasploitable - 6:58
    • Nmap part 1 - 15:32
    • Nmap part 2 - 11:43
    • Nmap part 3 - 12:24
    • Zenmap - 7:52
    • TCP scans - 15:50
    • Nmap bypassing defenses - 17:23
    • Nmap scripts part 1 - 9:28
    • Nmap scripts part 2 - 13:59
  • Website Penetration Testing
    • Installing OWASP - 8:26
    • HTTP request - 9:57
    • HTTP response - 10:27
    • Burpsuite configuration - 12:49
    • Editing packets in Burpsuite - 12:20
    • Whatweb and Dirb - 10:10
    • Password recovery attack - 15:32
    • Burpsuite login bruteforce - 11:01
    • Hydra login bruteforce - 8:44
    • Session fixation - 13:51
    • Injection attacks - 5:31
    • Simple command injection - 11:04
    • Exploiting command injection vulnerability - 7:38
    • Finding blind command injection - 13:39
    • SQL basics - 10:21
    • Manual SQL injection part 1 - 13:12
    • Manual SQL injection part 2 - 20:49
    • SQLmap basics - 16:34
    • XML injection - 15:54
    • Installing XCAT and preventing injection attacks - 5:50
    • Reflected XSS - 10:46
    • Stored XSS - 11:56
    • Changing HTML code with XSS - 7:28
    • XSSer and XSSsniper - 13:32
  • Wireless Cracking
    • Wireless attack theory - 10:49
    • Putting network card in monitor mode - 4:39
    • Capturing handshake with airodump - 14:35
    • RockYou.txt - 13:53
    • Cracking with Aircrack - 15:32
    • Cracking with Hashcat - 14:55
    • Making password lists with Crunch - 18:20
    • Making password lists with Cupp - 7:10
    • Rainbow tables part 1 - 16:34
    • Rainbow tables part 2 - 5:38
    • Installing Fluxion - 6:17
    • Finding and cracking hidden networks - 8:18
    • Preventing wireless attacks - 7:57
  • Man in the Middle Attacks
    • ARP protocol basics - 10:28
    • MITM attack theory - 7:18
    • Installing MITMf - 6:36
    • Manual ARP spoofing - 12:47
    • Problems while installing MITMf - 6:18
    • HTTP traffic sniffing - 8:29
    • DNS spoofing and HTTPS password sniffing - 24:18
    • Hooking browsers with BEEF - 16:01
    • Screenshotting targets browser - 11:00
    • Cloning any webpage - 8:53
    • Ettercap basics - 6:57
  • System Hacking with Metasploit
    • MSFconsole environment - 16:05
    • Metasploit modules explained - 12:11
    • Bruteforcing SSH with Metasploit - 15:17
    • Attacking Tomcat with Metasploit - 8:49
    • Getting Meterpreter with command injection - 25:05
    • PHP code injection - 5:43
    • 2 Metasploitable injections - 6:57
    • Wine installation - 12:01
    • Creating Windows payloads with Msfvenom - 10:00
    • Encoders and Hex editor - 18:42
    • Windows 10 Meterpreter shell - 11:57
    • Meterpreter environment - 11:25
    • Windows 10 privilege escalation - 11:28
    • Preventing privilege escalation - 6:21
    • Post exploitation modules - 14:10
    • Getting Meterpreter over internet with port forwarding - 10:39
    • Eternalblue exploit - 20:15
    • Persistence module - 13:14
    • Hacking over the internet with Ngrok - 10:24
    • Android device attack with Venom - 9:54
    • The real hacking begins now! - 2:25
  • Python Crash Course
    • Variables - 13:40
    • Raw input - 10:46
    • If else statements - 10:17
    • For loops - 6:30
    • While loops - 8:23
    • Python lists - 8:03
    • Functions - 14:33
    • Classes - 10:20
    • Importing libraries - 6:59
    • Files in Python - 11:43
    • Try and except rule - 5:11
  • Coding an Advanced Backdoor
    • Theory behind reverse shells - 6:47
    • Simple server code - 12:40
    • Connection with reverse shell - 7:07
    • Sending and receiving messages - 10:46
    • Sending messages with while true loop - 7:52
    • Executing commands on target system - 9:37
    • Fixing backdoor bugs and adding functions - 20:08
    • First test using our backdoor - 17:59
    • Trying to connect every 20 seconds - 12:23
    • Creating persistence part 1 - 6:09
    • Creating persistence part 2 - 16:45
    • Changing directory - 11:51
    • Uploading and downloading files - 22:29
    • Downloading files from internet - 22:42
    • Starting programs using our backdoor - 6:44
    • Capturing screenshot on targets pc - 18:43
    • Embedding backdoor in image part 1 - 13:27
    • Embedding backdoor in an image part 2 - 8:37
    • Checking for administrator privileges - 12:10
    • Adding help option - 8:51
  • Creating a Keylogger for the Backdoor
    • Importing Pynput - 10:20
    • Simple keylogger - 9:55
    • Adding report function - 10:32
    • Writing keystrokes to a file - 13:59
    • Adding keylogger to our reverse shell part 1 - 22:59
    • Adding keylogger to our reverse shell part 2 - 7:39
    • Final project test - 14:24
  • Basic Authentication Bruteforcer
    • Printing banner - 11:19
    • Adding available options - 11:12
    • Starting threads for bruteforce - 8:23
    • Writing function to run the attack - 11:02
    • Bruteforcing router login - 9:37
    • Bypassing antivirus with your future programs - 13:41
    • Sending malware with spoofed email - 15:13
  • BONUS - Building a Career in Cyber Security
    • Introduction - 2:33
    • Why is ethical hacking important? - 23:00
    • What is the best ethical hacking certification? - 16:31
    • Tips for getting your first job as an ethical hacker - 18:24
    • How I started my career as an ethical hacker - 14:11
    • How to price your work - 10:47

View Full Curriculum


Access
Lifetime
Content
9.0 hours
Lessons
91

Practical Hacking using Raspberry Pi

Improve Your Hacking Skills by Using Your Portable Raspberry Pi for Pen Testing & Security Auditing

By Saad Sarraj | in Online Courses

In this course, you are going to start as a beginner without any previous knowledge about hacking. This time, we will use the Raspberry Pi instead of our PC/Laptop for hacking. We will start by setting up the Raspberry Pi and end with using it to carry out various attacks like Wi-Fi, Windows, Linux, and macOS hacking. This course is intended to be for beginners and professionals. If you are a beginner, you will start from zero until you become an expert, and if you are a professional, this course will level up your knowledge about hacking.

  • Access 91 lectures & 9 hours of content 24/7
  • Use Raspberry Pi for penetration testing
  • Learn tons of Linux commands & interact with Terminal
  • Learn what Raspberry Pi is
  • Build your own Portable Hacking Device
  • Configure Raspberry Pi with Kali Linux properly
  • Take your Raspberry Pi Everywhere
  • Connect to Raspberry Pi wirelessly via SSH using PC/Laptop/Smartphone
  • Connect to Raspberry Pi over WAN

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Saad Sarraj
4.3/5 Instructor Rating: ★ ★ ★ ★

Saad Sarraj has been an Ethical Hacker since 2012. He founded the website iSecurityPro and has been educating people on Linux and Windows security tips through his YouTube channel over that time. He is always focused on the practical side of his teaching and the theory behind every attack.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic IT skills
  • PC/Laptop
  • Raspberry Pi 3 & Zero
  • ALFA AWUS036ACH & AWUSO36NH

Access
Lifetime
Content
11.0 hours
Lessons
90

Learn Practical Hacking Using Metasploit From Scratch

Learn Hacking Windows 10/8/7/Vista & Android using Metasploit Detect and Secure your OS from Hackers

By Saad Sarraj | in Online Courses

In this course, you will start as a beginner without any previous knowledge of hacking. The course focuses on the practical and theoretical sides to ensure that you understand the attack before performing it. In this course, you'll learn how black hat hackers hack Windows OS using advanced techniques. In addition to that, you'll learn how white hat hackers Secure Windows OS by analyzing the malicious files and how to detect the hacker's identity.

  • Access 90 lectures & 11 hours of content 24/7
  • Learn Linux basics commands
  • Learn to use Nmap/Zenmap to enumerate targets
  • Master Metasploit
  • Embed your payload with any file type
  • Spoof the backdoor Extension
  • Interact with the compromised system via Meterpreter command line
  • Crack the administrator password
  • Capture the keystrokes of the compromised system
  • Pivot your own every device on the network

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Saad Sarraj
4.3/5 Instructor Rating: ★ ★ ★ ★

Saad Sarraj has been an Ethical Hacker since 2012. He founded the website iSecurityPro and has been educating people on Linux and Windows security tips through his YouTube channel over that time. He is always focused on the practical side of his teaching and the theory behind every attack.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • A computing environment (Windows, Linux, Mac) with at least 8GB of RAM and 20GB of disk space

Access
Lifetime
Content
6.0 hours
Lessons
69

Practical Wireless Networks Hacking from Scratch

Hack & Secure WEP/WPA/WPA2/ WPA-Enterprise Encryption Keys and Perform MITM Attack From Scratch

By Saad Sarraj | in Online Courses

In this course, you will start as a beginner without any previous knowledge about hacking. This course focuses on both the practical side and the theoretical side. In this course, you will start from scratch, from setting up your hacking lab environment to implementing advanced Wi-Fi Attacks. Moreover, you'll learn how to perform Man in the Middle attacks after gaining access to a Wi-Fi network.

  • Access 69 lectures & 6 hours of content 24/7
  • Set up the latest version of Kali Linux as a virtual machine or as your main OS
  • Understand what should be done before network security testing
  • Disconnect, kick any client from your target network or even jam the wireless access point completely without having its password
  • Crack WEP/WPA/WPA2 encryption keys & learn the theory behind each attack
  • Learn how WPA-Enterprise networks work & what attack can you carry out to access the network
  • Perform man-in-the-middle attacks
  • Protect your OS & your Wi-Fi access point against all previous attacks

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Saad Sarraj
4.3/5 Instructor Rating: ★ ★ ★ ★

Saad Sarraj has been an Ethical Hacker since 2012. He founded the website iSecurityPro and has been educating people on Linux and Windows security tips through his YouTube channel over that time. He is always focused on the practical side of his teaching and the theory behind every attack.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • A computing environment (Windows, Linux, Mac) with at least 8GB of RAM and 20GB of disk space

Access
Lifetime
Content
4.0 hours
Lessons
59

Ethical Hacking: Network Scan by Nmap & Nessus

Discover Networks & Check Devices with Vulnerabilities by Using Nmap

By Oak Academy | in Online Courses

To be able to perform successful penetration testing or ethical hacking. First, you have to know all the secrets of your targets. You should find all the systems and network devices of your target network before proceeding with an ethical hacking operation. In this course, you`ll discover the secrets of ethical hacking and network discovery using Nmap. You’ll learn all the Nmap details, which is the most known and de facto network scanning tool. Then in further lessons, you’ll scan the vulnerabilities of the network you discovered by using Nessus. Nessus is the most known vulnerability scanner and is in the third place of the most popular cybersecurity tools.

4.5/5 average rating: ★ ★ ★ ★

  • Access 59 lectures & 4 hours of content 24/7
  • Understand the main terminology of Network Scanning & Finding Vulnerabilities in devices in a network
  • Use Nmap with full knowledge & experience
  • Scan a network for scripts
  • Learn about networking scan types
  • Learn how to use Hping

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course is their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • 1 - Introduction - 0:42
    • 2 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 3 - Lab's Architecture Diagram - 1:29
    • 4 - Using VirtualBox vs VMware
    • 5 - Install & Run Oracle VM VirtualBox - 5:02
    • 6 - Installing Kali using the VMware Image - Step 1 - 3:13
    • 7 - Installing Kali using the VMware Image - Step 2 - 4:47
    • 8 - Installing Kali using the VMware Image - Step 3 - 4:30
    • 9 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 10 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 11 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 12 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 13 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 14 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 15 - Installing Kali using the ISO file for VirtualBox - Step 1 - 1:26
    • 16 - Installing Kali using the ISO file for VirtualBox - Step 2 - 6:49
    • 17 - Installing Kali using the ISO file for VirtualBox - Step 3 - 4:23
    • 18 - Free Windows Operating Systems on VMware Fusion - 5:54
    • 19 - Free Windows Operating Systems on Oracle VM VirtualBox - 2:55
    • 20 - Windows Systems as Victim - 0:59
    • 21 - Configuring NAT Network in Oracle VM VirtualBox - 1:07
  • Scan Types
    • 22 - Scan Types Definitions: Active Scan & Passive Scan - 2:50
    • 23 - Passive Scan - Wireshark - 6:37
    • 24 - Passive Scan - ARP Tables - 6:20
    • 25 - Active Scan - 8:30
  • Nmap Introduction & Basics
    • 26 - Nmap Introduction - 4:14
    • 27 - TCP/IP Basics - Layers and Protocols - 9:26
    • 28 - TCP/IP Basics - An Example: DNS Query - 5:19
    • 29 - TCP/UDP Basics - 7:11
  • Nmap in Action - 1 : Scan Types
    • 30 - Ping Scan - 4:59
    • 31 - SYN Scan - 7:31
    • 32 - Port Scan - 8:15
    • 33 - TCP Scan - 7:11
    • 34 - UDP Scan - 4:11
  • Nmap in Action - 2 : Detection & Management
    • 35 - Version Detection - 7:10
    • 36 - Operating System Detection - 5:58
    • 37 - Input-Output Management - 8:28
    • 38 - Lab Exercise - 1 - 0:49
  • Nmap in Action - 3 : Script Scanning
    • 39 - Introduction - 3:40
    • 40 - First Script Example - 7:43
    • 41 - Second Script Example - 2:21
    • 42 - Third Script Example - 2:48
    • 43 - Nmap Aggressive Scan
  • Nmap in Action - 4 : Timing and IPS/IVS Evasion
    • 44 - Bypassing IPS/IDS Devices - 6:07
    • 45 - Timing - 5:45
  • Nmap in Action - 5 : Some Other Scans
    • 46 - NULL, FIN, XMAS and ACK Scan - 2:55
    • 47 - Idle Scan - 7:44
  • Vulnerability Scan and Introduction to Nessus
    • 48 - Introduction to Vulnerability Scan - 9:29
    • 49 - Nessus® Home vs Nessus® Essentials
    • 50 - Introduction to Nessus - 1:57
    • 51 - Downloading Nessus - 1:40
    • 52 - Installing Nessus - 3:41
  • Nessus in Action
    • 53 - Creating Policy - 5:39
    • 54 - Scanning - 7:06
    • 55 - Reporting - 2:20
    • 56 - Lab Exercise - 2 - 2:47
    • 57 - An Aggressive Scan with Nessus: Start - 4:23
    • 58 - An Aggressive Scan with Nessus: Results - 7:17
    • 59 - An Aggressive Scan with Nessus: Results with Windows Targets - 2:45

View Full Curriculum


Access
Lifetime
Content
20.0 hours
Lessons
299

Ethical Hacking & Penetration Testing Bootcamp with Linux

Practical & Accessible Ethical Hacking Lectures to Help Keep Your Networks Safe from Cybercriminals

By Oak Academy | in Online Courses

Whether you want to get your first job in IT security, become a white hat hacker, or prepare to check the security of your own home network, this ethical hacking course offers practical and accessible ethical hacking lectures to help keep your networks safe from cybercriminals. This is focused on the practical side of penetration testing and ethical hacking but also will share with you the theoretical side of each attack and Linux basics. Before jumping into Penetration Testing or other practices with Ethical Hacking tools you will first learn how to set up a lab and install needed software on your machine. In this course, you will have a chance to keep yourself up to date and equip yourself with a range of Ethical Hacking skills.

4.4/5 average rating: ★ ★ ★ ★

  • Access 299 lectures & 20 hours of content 24/7
  • Learn how to exploit servers, networks & applications
  • Find any weak spots in a system’s security before hackers with malicious intent find them & exploit them
  • Learn Kali Linux fundamentals
  • Use basic commands
  • Know the steps & tools that you will use in pentest

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course is their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Minimum 8 GB RAM for ethical hacking and penetration testing

Course Outline

  • Ethical Hacking and Penetration Testing Bootcamp with Linux Documents
    • 1- FAQ about Ethical Hacking
    • 2- FAQ about Penetration Test
    • 3- FAQ about Linux
  • Intoduction to Linux
    • 4- What is Linux - 1:34
    • 5- Distributions - 1:22
    • 6- Pieces of Linux - 2:57
    • 7- Shell - 2:04
    • 8- Linux Signs - 0:59
    • 9- Linux Desktop Enviroments - 1:53
    • 10- Linux File Hierarchy - 2:57
  • About Kali Linux
    • 11- Kali Linux History - 1:54
    • 12- Kali Linux GUI - 3:19
  • Installing Kali Linux
    • 13- Virtual Platforms - 1:29
    • 14- Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 15- Labs Architecture Diagram - 1:23
    • 16- Using VirtualBox vs VMware
    • 17- VirtualBox Install & Run - 4:53
    • 18- Installing Kali From VMware File for VMware - Step 1 - 3:30
    • 19- Installing Kali From VMware File for VMware - Step 2 - 4:47
    • 20- Installing Kali From VMware File for VMware - Step 3 - 4:30
    • 21- Installing Kali From ISO File for VMware - Step 1 - 1:26
    • 22- Installing Kali From ISO File for VMware - Step2 - 6:48
    • 23- Installing Kali From ISO File for VMware - Step 3 - 2:41
    • 24- Installing Kali From ISO File for Virtualbox - Step1 - 1:34
    • 25- Installing Kali From ISO File for VirtualBox - Step2 - 6:49
    • 26- Installing Kali From OVA File for VirtualBox - Step 1 - 3:05
    • 27- Installing Kali From OVA File for VirtualBox - Step 2 - 6:44
    • 28- Installing Kali From OVA File for VirtualBox - Step 3 - 4:11
    • 29- OWAS Installation - 5:24
    • 30- Free Windows Operating Systems on VMware - 5:45
    • 31- Free Windows Operating Systems on Oracle VM VirtualBox - 2:46
    • 32- Windows Systems as Victim - 0:59
    • 33- Metasploitable2 Installation - 3:12
    • 34- Configuring NAT Network in Oracle VM VirtualBox - 1:07
  • Basic Linux Commands - 1
    • 35- Command Parameters - 2:19
    • 36- List Files - "ls" Command - 4:34
    • 37- Print Working Directory - "pwd" Command - 0:55
    • 38- Change Directory - "cd" Command - 2:11
    • 39- Change Directory - "cd" Command - 2:18
    • 40- Concatenate Files - "cat" Command - 2:16
    • 41- Display Output - "echo" Command - 1:34
    • 42- View the File with "more" Command - 2:22
    • 43- View the File with "less" Command - 1:23
    • 44- Print First Lines with "head" Command - 1:15
    • 45- Print Last Lines with "tail" Command - 1:39
    • 46- Global Regular Expression Print - "grep" Command - 3:35
    • 47- Unix Name - "uname" Command - 0:47
    • 48- Output Redirection - 2:37
    • 49- Output Redirection : Pipe “|” - 2:17
  • Basic Linux Commands - 2
    • 50- Make Directory - "mkdir" Command - 1:22
    • 51- Create File & Modify Date - "touch" Command - 1:20
    • 52- Remove Files or Directories - "rm" Command - 2:07
    • 53- Copy and Move Files or Directories - "cp" & "mv" Command - 1:58
    • 54- Find Files and Directories - "find" Command - 2:24
    • 55- Cut Parts of Lines - "cut" Command - 2:51
    • 56- Change Ownership of a Given File - "chown" Command - 1:32
  • Configuring Kali Linux
    • 57- Configuring Services - 3:42
    • 58- User Management in Linux - 2:38
  • Package management
    • 59- Package Management Concepts - 3:25
    • 60- Foremost Linux Package Managers - 2:32
    • 61- Repository (a.k.a. Repo) - 0:49
    • 62- “apt-get” Package Manager - 6:08
    • 63- Debian packages "dpkg" - 2:26
    • 64- Install from Source Code - 4:35
  • Monitoring
    • 65- System Monitoring - 6:59
    • 66- Status of Network - 1:49
    • 67- Firewall or Packet Filtering Creating Rules - 5:52
  • Introduction to Penetration Testing (Pentest +)
    • 68- Content of the Penetration Testing - 2:34
    • 69- Definition of "Penetration Test" - 2:13
    • 70- Penetration Test Types - 0:28
    • 71- Security Audits - 4:41
    • 72- Vulnerability Scan - 2:45
    • 73- Terms: Asset, Threat, Vulnerability, Risk, Exploit - 3:08
    • 74- Penetration Test Approaches - 2:44
    • 75- Planning a Penetration Test - 4:24
    • 76- Penetration Test Phases - 7:00
    • 77- Legal Issues & Testing Standards - 4:18
    • Quiz - Introduction to Penetration Test
  • Network Fundamentals
    • 78- Attention for Ethical Hackers
    • 79- Content of the Section - 1:07
    • 80- Basic Terms of Networking - 5:36
    • 81- Reference Models - 0:24
    • 82- TCPIP (Networking) Basics - 13:43
    • 83- OSI Reference Model vs. TCPIP Reference Model - 2:32
    • 84- Network Layers in Real World - 7:59
    • 85- Layer 2- Data Link Layer - 3:50
    • 86- Layer 2: Ethernet - Principles, Frames & Headers - 4:06
    • 87- Layer 2: ARP - Address Resolution Protocol - 6:10
    • 88- Layer 2: Analysing ARP Packets - 3:14
    • 89- Layer 2: VLANs (Virtual Local Area Networks) - 4:03
    • 90- Layer 2: WLANs (Wireless Local Area Networks) - 7:01
    • 91- Layer 3 - Network Layer - 1:36
    • 92- Layer 3: IP (Internet Protocol) - 2:49
    • 93- Layer 3: IPv4 Addressing System - 1:56
    • 94- Layer 3: IPv4 Packet Header - 2:56
    • 95- Layer 3: Subnetting - Classful Networks - 2:35
    • 96- Layer 3: Subnetting Masks - 2:59
    • 97- Layer 3: Understanding IPv4 Subnets - 3:09
    • 98- Layer 3: IPv4 Address Shortage - 1:41
    • 99- Layer 3: Private Networks - 3:59
    • 100- Layer 3: Private Networks - Demonstration - 3:01
    • 101- Layer 3: NAT (Network Address Translation) - 4:30
    • 102- Layer 3: IPv6, Packet Header & Addressing - 8:30
    • 103- Layer 3: DHCP - How the Mechanism Works - 9:23
    • 104- Layer 3: ICMP (Internet Control Message Protocol) - 2:02
    • 105- Layer 3: Traceroute - 9:50
    • 107- Layer 4: TCP (Transmission Control Protocol) - 6:59
    • 108- Layer 4: TCP Header - 2:27
    • 109- Layer 4: UDP (User Datagram Protocol) - 3:56
    • 110- Layer 5-7 - Application Layer - 0:55
    • 111- Layer 7: DNS (Domain Name System) - 5:56
    • 112- Layer 7: HTTP (Hyper Text Transfer Protocol) - 3:09
    • 113- Layer 7: HTTPS - 1:56
    • 114- Summary of Network Fundamentals - 1:23
    • Quiz - Network Fundamentals
  • Network Scan in Ethical Hacking
    • 115- Content of the Section - 0:35
    • 116- Network Scan Types - 2:50
    • 117- Passive Scan with Wireshark - 6:35
    • 118- Passive Scan with ARP Tables - 6:20
    • 119- Active Scan with Hping - 4:26
    • 120- Hping for Another Purpose DDoS - 4:03
  • NMAP: The Network Mapper
    • 121- Introduction to Nmap - 4:14
    • 122- Ping Scan - 4:59
    • 123- TCP/IP (Networking) Basics - 9:26
    • 124- TCP/IP Model on an Example - 5:19
    • 125- TCP & UDP Protocols Basics - 7:11
    • 126- Introduction to Port Scan - 1:12
    • 127- SYN Scan - 6:07
    • 128- Details of the Port Scan - 8:15
    • 129- TCP Scan - 7:11
    • 130- UDP Scan - 4:11
    • 131- Version Detection in Nmap - 7:10
    • 132- Operating System Detection - 5:58
    • 133- Input Output Management in Nmap - 8:28
    • 134- Nmap Scripting Engine Introduction - 3:40
    • 135- Nmap Scripting Engine: First Run - 7:43
    • 136- Nmap Scripting Engine First Example - 2:21
    • 137- Nmap Scripting Engine: Second Example - 2:48
    • 138- Nmap Aggressive Scan
    • 139- How to Bypass Security Measures in Nmap Scans - 6:07
    • 140- Timing of the Scans - 5:45
    • 141- Some Other Types of Scans: XMAS, ACK, etc. - 2:55
    • 142- Idle (Zombie) Scan - 7:44
    • Quiz - Network Scan and Nmap
  • Vulnerability Scan and Introduction to Nessus
    • 143- Introduction to Vulnerability Scan - 9:19
    • 144- Introduction to Nessus - 1:57
    • 145- Nessus® Home vs Nessus® Essentials
    • 146- Nessus: Download - 1:40
    • 147- Nessus: Install & Setup - 3:42
    • 148- Nessus: Creating a Custom Policy - 5:39
    • 149- Nessus: First Scan - 7:07
    • 150- An Aggressive Scan - 4:23
    • 151- Results of an Aggressive Scan - 7:17
    • 152- Results of an Aggressive Scan with Windows Systems - 2:45
    • 153- Nessus: Report Function - 2:21
  • Exploitation (Gaining Session)
    • 154- Content of the Exploitation - 0:43
    • 155- Exploitation Terminologies - 6:13
    • 156- Exploit Databases - 1:56
    • 157- Manual Exploitation - 5:39
    • 158- Exploitation Frameworks - 3:36
    • 159- Metasploit Framework (MSF): Introduction - 1:22
    • 160- Architecture of Metasploit Framework - 5:01
    • 161- Introduction to MSF Console - 2:13
    • 162- MSF Console: Initialisation - 2:16
    • 163- MSF Console: Search Function & Ranking of the Exploits - 3:37
    • 164- MSF Console: Configure & Run an Exploit - 7:46
    • 166- Running the First Exploit in Meterpreter - 2:12
    • 167- Meterpreter Basics on Linux - 8:36
    • 168- Meterpreter Basics on Windows - 5:51
    • 169- Pass the Hash: Hack Even There is No Vulnerability - 4:00
    • 170- Pass the Hash: Preparation - 3:49
    • 171- Pass the Hash: Gathering Some Hashes - 2:15
    • 172- Pass the Hash: Try Other Assets - 10:25
  • x
    • 173- Introduction to Post-Exploitation - 3:28
    • 174- Persistence: What is it? - 1:28
    • 175- Persistence Module of Meterpreter - 8:55
    • 176- Removing a Persistence Backdoor - 5:00
    • 177- Persist on a Windows 8 Using Meterpreter's Persistence Module - 2:56
    • 178- Another Way of Persistence: Persistence Exe - I - 4:40
    • 179- Another Way of Persistence: Persistence Exe - II - 4:32
    • 180- Meterpreter for Post-Exploitation - 1:37
    • 181- Meterpreter for Post-Exploitation: Core Extension - 1:45
    • 182- Meterpreter for Post-Exploitation: Core Extension - Session Commands - 2:31
    • 183- Meterpreter for Post-Exploitation: Core Extension - Channel Command - 2:43
    • 184- Meterpreter for Post-Exploitation: Core Extension - Migrate Commands - 3:34
    • 186- Meterpreter for Post-Exploitation: Stdapi Extension - File System Commands - 5:19
    • 187- Meterpreter for Post-Exploitation: Stdapi Extension - System Commands - 4:13
    • 188- Meterpreter for Post-Exploitation: Stdapi Extension - User Interface Commands - 4:08
    • 189- Meterpreter for Post-Exploitation: Incognito Extension - 3:26
    • 190- Meterpreter for Post-Exploitation: Mimikatz Extension - 3:53
    • 192- Post Modules: Gathering Modules - 1:21
    • Quiz - Exploitation and Post Exploitation
  • Password Cracking in Ethical Hacking
    • 194- Introduction to Password Cracking - 3:06
    • 195- Password Hashes of Windows Systems - 3:30
    • 196- Password Hashes of Linux Systems - 2:33
    • 197- Classification of Password Cracking - 2:11
    • 198- Password Cracking Tools - 0:08
    • 199- Hydra: Cracking the Password of a Web App - 10:01
    • 200- Password Cracking with Cain & Abel - 1:01
    • 201- Cain & Abel - Step 1: Install & First Run - 2:39
    • 202- Cain & Abel: Gathering Hashes - 4:40
    • 203- Cain & Abel: Importing Hashes - 4:31
    • 204- Cain & Abel: A Dictionary Attack - 4:19
    • 205- Cain & Abel: A Brute Force Attack - 3:32
    • 206- John the Ripper - 7:28
    • New Lecture
  • Information Gathering Over the Internet
    • 207- Content of the Section - 5:51
    • 208- Search Engine Tool: SearchDiggity - 3:59
    • 209- Using Search Engines to Gather Information - 3:36
    • 210- Shodan - 2:50
    • 211- Gathering Information About the People - 3:10
    • 212- Web Archives - 1:53
    • 213- FOCA - Fingerprinting Organisations with Collected Archives - 6:45
    • 214- Fingerprinting Tools The Harvester and Recon-NG - 3:22
    • 215- Maltego - Visual Link Analysis Tool - 4:38
  • Web Application Penetration Testing
    • 216- Content of the Penetration Testing - 1:12
    • 217- Basic Terminologies - I - 5:35
    • 218- Basic Terminologies - II - 7:03
    • 219- Intercepting HTTP Traffic with Burp Suite - 3:46
    • 220- Intercepting HTTPS Traffic with Burp Suite - 2:50
    • 221- Classification of Web Attacks - 1:36
    • 222- Zed Attack Proxy (ZAP): A Web App Vulnerability Scanner - 3:06
    • 223- ZAP: Installation & Quick Scan - 6:25
    • 224- ZAP: As a Personal Proxy - 4:40
    • 225- ZAP: Intercepting the HTTPS Traffic - 2:17
    • 226- ZAP: An Advanced Scan - Scanning a Website that Requires to Login - 14:46
    • 227- Information Gathering and Configuration Flaws - I - 5:09
    • 228- Information Gathering and Configuration Flaws - II - 4:26
    • 229- Input & Output Manipulation - 7:42
    • 230- XSS (Cross Site Scripting) - Reflected XSS - 4:05
    • 231- XSS (Cross Site Scripting) - Stored and DOM Based XSS - 7:01
    • 232- BeEF - The Browser Exploitation Framework - 5:39
    • 233- SQL Injection - Part I - 4:20
    • 234- SQL Injection - Part II - 4:41
    • 235- SQL Injection - Part III - 5:20
    • 236- Authentication - 5:36
    • 237- Authentication Attacks - 5:13
    • 238- Hydra: Cracking the Password of a Web App - 10:01
    • 239- Authorization Flaws - 5:18
    • 240- Path Traversal Attack Demo - 3:40
    • 241- Session Management - 3:03
    • 242- Session Fixation & Demo - 4:22
    • 243- Cross Site Request Forgery (CSRF) - 5:12
  • Social Engineering & Phishing Attacks
    • 244- Content of the Section ( Social Engineering & Phishing Attacks ) - 0:51
    • 248- Social Engineering Terms - 5:19
    • 246- Social Engineering Terminologies - II - 6:08
    • 247- Creating Malware - Terminologies - 3:36
    • 248- MSF Venom - Part I - 14:08
    • 249- MSF Venom - Part II - 2:25
    • 250- Veil to Create Malware - 2:36
    • 251- Veil in Action - 5:12
    • 252- TheFatRat to Create Malware - 4:19
    • 253- TheFatRat in Action - 11:07
    • 254- TheFatRat - Overcoming a Problem - 0:46
    • 255- Embedding Malware in PDF Files - 4:04
    • 256- Embedding Malware in Word Documents - 9:21
    • 257- Embedding Malware in Firefox Add-ons - 7:02
    • 258- Empire Project - Installation - 4:07
    • 259- Empire in Action - Part I - 8:12
    • 260- Empire in Action - Part II - 4:23
    • 262- Social Engineering Toolkit (SET) for Phishing - 6:33
    • 263- Sending Fake Emails for Phishing - 1:11
  • Network Layer & Layer 2 Attacks
    • 265- Content of the Section (Network Layer & Layer 2 Attacks) - 1:15
    • 266- GNS3 - Graphical Network Simulator - 3:30
    • 267- GNS3: Setting Up the First Project - 7:57
    • 268- GNS3: Tool Components - 2:56
    • 269- GNS3: Building the Network - 15:45
    • 270- GNS3: Attaching VMware VMs (Including Kali) to the Network - 6:31
    • 271- GNS3: Configuring Switch & Router (Cisco) and creating VLANs - 5:13
    • 272- Introduction to Network Security - 1:45
    • 273- Sniffing - 1:03
    • 274- Sniffing Network with TCPDump - 5:23
    • 275- TCPDump in Action - 8:59
    • 276- Wireshark to Sniff the Network Traffic - 8:34
    • 277- Wireshark: Following Stream - 2:40
    • 278- Wireshark: Summarise Network - 6:19
    • 279- Active Network Devices: Router, Switch, Hub - 4:44
    • 280- How to Expand Sniffing Space? - 5:13
    • 282- MAC Flood Using Macof - 7:09
    • 283- MAC Flood Countermeasures - 1:13
    • 284- ARP Spoof - 3:40
    • 285- ARP Cache Poisoning using Ettercap - 10:35
    • 286- DHCP Starvation & DHCP Spoofing - 3:36
    • 287- DHCP Mechanism - 6:15
    • 288- DHCP Starvation - Scenario - 3:59
    • 290- VLAN Hopping - 2:04
    • 291- VLAN Hopping: Switch Spoofing - 1:39
    • 292- VLAN Hopping: Double Tagging - 3:17
  • Penetration Testing & Auditing Active Network Devices
    • 293- Reconnaissance: Finding Open Ports & Services Using NMAP - 5:05
    • 295- Online SSH Password Cracking With Hydra - 7:58
    • 297- Compromising SNMP: Finding Community Names Using NMAP Scripts - 3:06
    • 298- Compromising SNMP: Write Access Check Using SNMP-Check Tool - 2:18
    • 299- Compromising SNMP: Grabbing SNMP Configuration Using Metasploit - 5:53
    • 300- Weaknesses of the Network Devices - 3:15
    • 303- ACLs (Access Control Lists) in Cisco Switches & Routers - 5:12
    • 304- SNMP Protocol Security - 4:07
  • Other Attacks in ethical hacking, certified ethical hacking, Ethical Intelligenc
    • 305- Bypassing Cross Origin Resource Sharing - 9:04
    • 306- XML External Entity Attack - 8:02
    • 307- Attacking Unrestricted File Upload Mechanisms - 7:05

View Full Curriculum


Access
Lifetime
Content
14.0 hours
Lessons
188

Full Ethical Hacking & Penetration Testing Course | Ethical

Network Scanning, Finding Vulnerabilities on Systems & General Competencies of Ethical Hackers

By Oak Academy | in Online Courses

The industry faces a skills gap that looks set to increase as cyber threats rise. It is predicted that there will be 3.5 million unfilled cybersecurity roles by 2021. If you are considering a career move, the skills gap represents an excellent opportunity. This course is a great start for you.

This course starts at beginner levels so you don’t need to have previous knowledge of Ethical Hacking. In this course, we will also cover the topic of Wi-Fi Hacking because Wi-Fi hacking is easier than hacking a device connected to that WiFi. There are many free tools that can hack the less secure Wi-Fi router. Apart from this, there are also advanced tools that work on backtrack and can even hack Wi-Fi routers with high security.

4.6/5 average rating: ★ ★ ★ ★

  • Access 188 lectures & 14 hours of content 24/7
  • Learn the security issues that are currently in the field
  • Learn testing methodologies & types
  • Use network scanning
  • Find vulnerabilities in systems
  • Learn the general competencies of ethical hackers

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course is their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic web and internet technologies such as HTML, HTTP, Document Object Model, and so on

Course Outline

  • Ethical Hacking - Setting Up the Laboratory
    • 1- Virtualbox Download and Install - 5:02
    • 2- FAQ regarding Ethical Hacking
    • 3- FAQ regarding Penetration Testing on Udemy:
    • 4- Kali ISO Download - 1:43
    • 5- Kali ISO Install - 7:21
    • 6- Kali VirtualBox Image Download and Install - 2:37
    • 7- Installing Metasploitable 2 - 3:43
    • 8- Installing Metasploitable 3: VM Creation with Vagrant - 6:21
    • 9- Downloading and Installing Free Windows 7 and Windows 10 - 2:58
    • 10- Nat Network Create and Settings - 3:14
    • 11- Connection Test - 6:36
    • 12- Updates for Kali Linux 2021.3
  • Passive Information Collection
    • 13- Passive Scan - ARP Tables - 6:20
  • Information Gathering Through the Internet
    • 14- Introduction - 6:00
    • 15- Using Search Engines & Google Hacking to Gather Information - 3:36
    • 16- Search Engine Tool: SearchDiggity - 3:15
    • 17- Shodan - 2:50
    • 18- Gathering Information about the People - 3:10
    • 19- Web Archives - 1:53
    • 20- FOCA Fingerprinting Organisations with Collected Archives - 6:45
    • 21- The Harvester & Recon-NG - 3:15
  • Active Information Collection ( Nmap )
    • 22- What is Nmap? - 3:44
    • 23- Nmap First Scan - 4:47
    • 24- What is Subnet? - 4:15
    • 25- Interpretation of Nmap Results - 2:04
    • 26- Scanning Specific IPs or Specific Targets With Nmap - 1:57
    • 27- Nmap IP List Creation - 4:07
    • 28- Nmap Random Scan and Exclude Ips - 4:17
    • 29- Print the Nmap Results to the File - 6:23
    • 30- Check In -1 - 0:47
    • 31- What Is the OSI Model and How Does It Work? - 5:18
    • 32- What Is TCP-IP - 8:57
    • 33- Domain Name System Service-DNS - 4:19
    • 34- What is Port? Nmap Port Scan - 3:34
    • 35- Scanning Top 20, Top 100 Ports With Nmap - 4:43
    • 36- Scanning Specific Ports With Nmap - 6:00
    • 37- Nmap Syn Scanning - 3:20
    • 38- Nmap TCP Scan - 2:46
    • 39- Namp UDP Scan - 4:12
    • 40- Nmap ACK Scan - 1:53
    • 41- Nmap Fin-Xmas-Null Scan - 3:26
    • 42- Nmap Fast Scan - 1:12
    • 43- Nmap Open Ports Scan - 1:23
    • 44- Nmap No PORT Scan - 2:15
    • 45- Nmap PING and noPING Scan - 3:19
    • 46- Check-2 - 1:13
    • 47- Nmap Verbose Command - 2:14
    • 48- Nmap With Service and Version Detection - 3:52
    • 49- Nmap Operating System Detection - 2:30
    • 50- Nmap Timing Templates - 3:36
    • 51- Bypass of IPS & IDS Systems With Nmap - 10:57
    • 52- Nmap Script Engine (NSE) - 10:59
    • 53- Nmap Script Engine Example - 1 - 2:53
    • 54- Nmap Script Engine Example - 2 - 0:58
    • 55- Writing an NSE Script - 9:52
    • 56- The Check-3 - 0:22
  • Using Nessus
    • 57- Introduction to Nessus - 1:57
    • 58- Downloading Nessus - 1:40
    • 59- Installing Nessus - 3:41
    • 60- Creating Policy - 5:39
    • 61- Scanning - 7:06
    • 62- Reporting - 2:20
    • 63- Lab Exercise - 2 - 2:47
    • 64- An Aggressive Scan with Nessus: Start - 4:23
    • 65- An Aggressive Scan with Nessus: Results - 7:17
    • 66- An Aggressive Scan with Nessus: Results with Windows Targets - 2:45
  • Using Maltego
    • 67- Maltego - Visual Link Analysis Tool - 7:09
  • Social Engineering
    • 68- Terminologies Part 1 - 5:19
    • 69- Terminologies Part 2 - 6:08
    • 70- Creating Malware and Terminologies - 3:36
    • 71- MSFvenom Part 1 - 14:08
    • 72- MSFvenom Part 2 - 2:25
    • 73- Veil Installation - 2:36
    • 74- Veil in Action - 5:12
    • 75- TheFatRat Installation - 4:19
    • 76- TheFatRat in Action - 11:07
    • 77- TheFatRat: Overcoming a Problem - 0:46
    • 78- Embedding Malware in PDF - 4:04
    • 79- Embedding Malware in WORD - 9:21
    • 80- Embedding Malware in Firefox Add-on - 7:02
    • 81- Empire Installation - 4:07
    • 82- Empire in Action Part 1 - 8:12
    • 83- Empire in Action Part 2 - 4:23
    • 84- Exploiting Java Vulnerabilities - 2:24
    • 85- Social Engineering Toolkit - 6:33
    • 86- Sending Fake Emails - Phishing - 1:11
    • 87- Vishing - Voice Phishing - 3:40
  • Network Attacks
    • 88- What is “Protocol” - 5:36
    • 89- Reference Models - 0:24
    • 90- OSI Reference Model - 13:43
    • 91- OSI vs TCP/IP - 2:32
    • 92- Demonstration using Wireshark - 7:59
    • 93- Standards & Protocols - 3:50
    • 94- Ethernet: Principles, Frame & Headers - 4:06
    • 95- ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets - 6:10
    • 96- ARP Hand-On Practices - 3:14
    • 97- VLANs – Virtual Local Area Networks - 4:03
    • 98- WLANs – Wireless Local Area Networks - 7:01
    • 100- Internet Protocol - IP - 2:49
    • 101- IPv4 Adressing System - 1:56
    • 102- IPv4 Packet Header - 2:56
    • 103- IPv4 Subnetting: Classful Networks - 2:35
    • 104- IPv4 Subnetting: Subnet Mask - 2:59
    • 105- IPv4 Subnetting: Understanding - 3:09
    • 106- IPv4 Shortage - 1:41
    • 107- Private Networks - 3:59
    • 108- Private Networks - Demonstration - 3:01
    • 109- NAT – Network Address Translation - 4:30
    • 110- IPv6, Packet Header & Addressing - 8:30
    • 111- DHCP - How the Mechanism Works - 9:23
    • 114- Introduction to Transport Layer - 2:39
    • 115- TCP – Transmission Control Protocol - 6:59
    • 119- DNS – Domain Name System - 5:56
    • 121- HTTPS - 1:56
    • 122- Checklist - What We Have Learned - 1:26
    • 124- Setting Up the Laboratory - 1:29
    • 126- Download & Install - 3:30
    • 128- GNS3 Environment - 2:56
    • 130- Attach Kali (or another VM) to the GNS3 Network - 6:31
    • 131- Configuring Switch & Router (Cisco) and creating VLANs - 5:14
    • 132- MitM: Listening to the traffic - 1:45
    • 133- Sniffing - 1:03
    • 134- TCPDump - 5:23
    • 135- Wireshark: Capturing the Traffic - 8:34
    • 136- Wireshark: Following Stream - 2:40
    • 137- Wireshark: Summarise Network - 6:19
    • 140- MAC Flood: Switching - 3:55
    • 141- MAC Flood: Using Macof Tool - 7:09
    • 142- MacFlood - Countermeasures - 1:13
    • 143- ARP Spoof - 3:40
    • 144- ARP Cache Poisoning using Ettercap - 10:35
    • 147- DHCP Starvation - Scenario - 3:59
    • 148- DHCP Starvation Demonstration with Yersinia - 8:33
    • 149- VLAN Hopping - 2:04
    • 150- VLAN Hopping: Switch Spoofing - 1:39
    • 151- VLAN Hopping: Double Tagging - 3:17
    • 152- Reconnaissance: Finding Open Ports & Services Using NMAP - 5:15
    • 153- Password Cracking - 2:06
    • 158- Weaknesses of network devices - 3:15
    • 159- Password Creation Methods of Cisco Routers - 7:49
    • 160- Identity Management - 0:52
  • Wi-Fİ Hacking And Tools
    • 163- Hardware and Software Requiments - 7:02
    • 166- Basic Terminologies and Concepts - 4:50
    • 167- Wireless Operating Modes - 6:11
    • 168- MAC Frame Structure - 2:58
    • 169- Wireless Packet Types - 5:21
    • 170- Wireshark: Analysing Packet Types - 6:32
    • 172- Wireless Encryption Protocols: WEP vs. WPA - 3:58
    • 173- WPA 4-Way Handshake - 5:45
    • 182- Wifi Pumpkin 3 - 7:30
    • 185- Fluxion: Captive Portal Attack - 5:28
    • 187- WEP Cracking - Fake Authentication Attack - 3:50
    • 191- WEP Cracking - Fragmentation Attack - 5:09
    • 194- WPA/WPA2 Cracking - Aircrack-ng - 3:56
    • 200- WPS Cracking - Wifite 2: PIN Attack - 3:50
  • Using Metasploit Framework
    • 201- What is a Penetration Test? - 3:19
    • 203- Importance of Penetration Testing - 3:15
    • 206- Penetration Testing Execution Standard - 5:39
    • 211- The Architecture of MSF - 1:43
    • 217- Metasploit Editions - 4:02
    • 226- Using Databases in MSF 2 - 3:14
    • 234- HTTP Enumeration - 6:02
    • 240- Vulnerability Scanning with Nessus Home - 6:56
    • 244- PHP CGI Argument Injection (phpcgiarg_injection) - 3:08
    • 245- MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption - 3:55
    • 250- WinRM Script Exec Remote Code Execution (winrmscriptexec) - 4:00
    • 256- Privilege Escalation - 8:23
    • 259- Pass The Hash with Metasploit - 5:46
    • 261- Extracting Cleartext Passwords - 9:47
    • 272- MSFvenom - 7:06
    • 274- MSFVenom: Using Custom Executable Template - 5:31
    • 276- Cleaning Events and Security Management Logs - 3:35
    • 277- Deceiving File System Using Timestomp - 6:06
  • Using Meterpreter
    • 279- Meterpreter Basics on Linux - 8:36
    • 281- Basic Meterpreter Commands 1 - 6:10
    • 283- Basic Meterpreter Commands 3 - 4:46
    • 288- Meterpreter Python / Powershell Extension - 8:06
    • 289- Meterpreter Backdoor and Persistency Modules - 9:34
  • Web Attacks
    • 293- Types of Security Testing - 9:43
    • 295- Laws and Ethic - 2:52
    • 298- Modern Web Applications - 3:05
    • 309- Core Technologies: Session State and Cookies - 3:34
    • 329- Attacking Insecure CAPTCHA Implementations - 8:39
    • 341- Definition - 3:02
    • 355- Command Injection Introduction - 5:35
    • 357- XML/XPATH Injection - 14:07
    • 362- Druppal SQL Injection: Drupageddon (CVE-2014-3704) - 7:49
    • 364- SQLite Manager: PHP Remote Code Injection - 2:55

View Full Curriculum


Access
Lifetime
Content
10.0 hours
Lessons
110

AWS Security Management & AWS Security Specialist Course

Cloud Computing, Security & More! Become an Effective Security Technician in a Business Environment

By Oak Academy | in Online Courses

Amazon Web Services (AWS) is a cloud computing platform with more than 200 featured services. Whether or not you aim for certification, an AWS course offers the theory and practical skills you need to land a job in cloud development, sales, engineering, networking, and more. Learn AWS with Oak Academy, and get started on a path to cloud computing expertise that opens the door to an exciting career. This course walks you through everything you need to learn Amazon Web Services(AWS) Security Management. The better you become at cloud computing, the more you can earn.

4.7/5 average rating: ★ ★ ★ ★

  • Access 110 lectures & 10 hours of content 24/7
  • Learn about Amazon Web Services(AWS) Security Management
  • Understand cloud security, its functions & components
  • Make basic AWS Cloud security configurations
  • Become an effective security technician in a business environment
  • Learn network topologies & threat analysis

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course is their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction to Amazon Web Services(AWS) Security Management Complete Course
    • 1 - What is Cloud? - 3:29
    • 2 - FAQ about AWS Security Management & AWS Security Specialist Course
    • 3 - Cloud Computing Models - 1:56
    • 4 - Useful AWS Security Documents Github Link
    • 5 - What are the usage areas of cloud computing? - 2:03
    • 6 - Data Management - 1:51
  • What is Cloud Security?
    • 7 - What is Cloud Security - 3:33
    • 8 - How does cloud security work - 3:19
    • 9 - What makes cloud security different - 3:24
    • 10 - Why is cloud security important - 2:26
    • 11 - Cloud Security Benefits-Disadvantages - 7:14
    • 12 - Cyber Security Architecture - 5:25
  • AWS - Amazon Web Service
    • 13 - What is AWS - 2:23
    • 14 - What is AWS Security - 1:57
    • 15 - AWS Account Create - 3:26
    • 16 - AWS Console Login - 2:45
  • AWS Foundational Services
    • 17 - AWS Compute(EC2) - 2:20
    • 18 - AWS VPC - 6:59
    • 19 - AWS Storage - 6:35
  • AWS IAM
    • 20 - What is IAM? - 4:49
    • 21 - Users & Groups in IAM - 2:52
    • 22 - Create IAM User & Group - 4:25
    • 23 - How IAM users sign in - 1:54
  • Access management
    • 24 - Access management - 2:36
    • 25 - Policy types - 3:04
    • 26 - Permissions and policies in IAM - 5:00
    • 29 - IAM roles - 11:11
    • 30 - Creating IAM Roles - 7:50
  • User Security
    • 31 - Security best practices and use cases - 9:42
    • 32 - Temporary security credentials - 11:51
  • AWS IAM Access Analyzer
    • 33 - IAM Access Analyzer - 3:36
    • 34 - Enabling Access Analyzer - 5:43
  • HostSecurity
    • 35 - Security in Amazon EC2 - 1:48
    • 36 - Infrastructure Security - 3:39
    • 37 - Checking Network Traffic - 8:52
    • 38 - Data Protection - 6:43
    • 39 - Create Virtual Machine - 6:25
    • 40 - EC2 for IAM - 7:07
    • 41 - EC2 with Storage - 4:08
    • 42 - Create and EBS Volume - 6:57
    • 43 - Monitoring Virtual Machine Component - 7:32
  • Data Store & Database Security
    • 44 - Data Store-Database Security - 2:02
    • 45 - Security zone modeling - 2:00
    • 46 - Defense In Depth - 1:05
    • 47 - Preventive Controls - 6:51
    • 48 - Detective Controls - 3:11
    • 49 - swim-lane isolation - 2:36
  • Application Security
    • 50 - AWS Shield - 3:32
    • 51 - AWS WAF Web Application Firewall - 2:05
  • AWS Storage
    • 52 - Amazon Simple Storage Service (Amazon S3) - 4:30
    • 53 - AWS Services Used for S3 Management and Monitoring - 2:20
    • 54 - Amazon S3 For Security - 7:34
    • 55 - Security Best Practices for Amazon S3 - 10:44
    • 56 - Amazon S3 Monitoring and Auditing Best Practices - 7:34
    • 57 - Amazon Elastic File System - 6:47
    • 58 - Create EFS File System - 10:40
    • 59 - Amazon EFS For Security - 10:23
    • 60 - Amazon FSx for Windows File Server - 13:01
    • 61 - Map your file share to an EC2 instance running Windows Server - 5:12
    • 62 - Security on Amazon FSx - 11:14
    • 63 - Amazon FSx for Luster - 1:56
    • 64 - Create AWS FSx for Luster - 15:19
    • 65 - Amazon FSx For Luster Security - 7:02
  • AWS VPC
    • 66 - AWS VPC - 1:28
    • 67 - VPC Fundamentals - 8:52
    • 68 - VPC ACL Management - 6:14
    • 69 - Create VPC - 15:06
    • 70 - PC Monitoring - 2:21
    • 71 - VPC Security - 6:26
  • AWS Firewall Manager
    • 72 - What is AWS Network Firewall - 2:58
    • 73 - AWS Network Firewall concepts - 2:54
    • 74 - Accessing AWS Network Firewall - 3:52
    • 75 - How Network Firewall Works - 5:21
    • 76 - Network Firewall Setting Up - 3:38
    • 77 - Getting Started With Network Firewall - 15:36
    • 78 - Firewall Policy Create/Update/Delete - 1:17
    • 79 - Management Rule Groups - 3:51
    • 80 - Security in Network Firewall - 3:01
    • 81 - Logging and Monitoring - 2:45
  • AWS WAF
    • 82 - AWS WAF - 4:11
    • 83 - Started WAF and Create Rules and Rules Group - 13:24
    • 84 - AWS Firewall Manager - 9:04
    • 85 - Create-Edit-Delete AWS WAF Policy - 6:23
  • AWS Shiled
    • 86 - What is AWS Shield - 2:50
    • 87 - How AWS Shield detects events - 13:06
    • 88 - Getting started with AWS Shield Advanced - 9:33
    • 89 - AWS Shield Monitoring Tools - 6:17
  • AWS Audit Manager
    • 90 - What is Audit manager - 2:10
    • 91 - Concepts and Terminologies Used in Audit Manager - 13:14
    • 92 - Using Dashboard - 5:20
  • AWS Cloud Watch
    • 93 - AWS Cloud Watch - 3:00
    • 94 - How Amazon CloudWatch Works - 1:30
    • 95 - Amazon CloudWatch concepts - 14:11
    • 96 - Getting started with Amazon CloudWatch - 6:10
    • 97 - Focus Alarms and Metrics for Different Sources - 5:39
    • 98 - Create AWS Cloud Watch Dashboard - 2:13
    • 99 - Creating and working with widgets on CloudWatch dashboards - 15:26
    • 100 - Control Panel Operations - 3:44
    • 101 - Create AWS Cloud Watch Alarm - 13:23
  • AWS Security Hub
    • 102 - AWS Security Hub - 3:48
    • 103 - Enable Disable Security Hub - 1:23
  • AWS Detective
    • 104 - Detective terms and concepts - 8:11
    • 105 - Setting up Amazon Detective - 3:41
    • 106 - Enable and Disable Detective - 2:59
    • 107 - Managing Accounts - 3:31
    • 108 - Logging and monitoring in AWS Detective - 3:37
  • AWS Inspector
    • 109 - AWS Inspector - 6:18
    • 110 - Getting started with Amazon Inspector - 8:06
    • 111 - Inspector dashboard - 5:16
    • 112 - Inspector and IAM - 1:48

View Full Curriculum


Access
Lifetime
Content
17.0 hours
Lessons
89

The Complete Python Hacking Course: Beginner to Advanced

Everything You Need to Know About the Art of Ethical Hacking

By Joseph Delgadillo | in Online Courses

If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or elevate your IT career, this is the course for you. Here, you'll learn from experienced network security professionals while covering the most important topics in ethical hacking today.

4.2/5 average rating: ★ ★ ★ ★

  • Access 89 lectures & 17 hours of content 24/7
  • Scan ports & vulnerabilities
  • Crack passwords
  • Generate your own custom tools & build programs that automate your attacks
  • Detect sniffers, flooders & spoofers on networks
  • Spoof DNS requests by changing IP addresses of legitimate hosts
  • Learn DNS hijacking & packet captures from remote machines

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Joseph Delgadillo | Best-Selling Instructor
4.2/5 Instructor Rating: ★ ★ ★ ★

Joseph Delgadillo teaches skills ranging from computers and technology to entrepreneurship and digital marketing. Take a course with him to get an over-the-shoulder view of how experts are successful in their respective fields. He is a proud alumnus of Central Washington University.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • A basic understanding of ethical hacking related concepts.

Course Outline

  • Introduction and Setup
    • Introduction to Python for ethical hacking - 5:16
    • VirtualBox installation - 11:39
    • Kali Linux installation - 17:05
    • Guest Additions installation - 15:06
    • Python in Kali terminal - 13:31
  • Port and Vulnerability Scanning
    • Building a simple portscanner - 15:30
    • Adding raw_input to our port scanner - 9:21
    • Scanning the first 1000 ports - 4:46
    • Coding an advanced port scanner part 1
    • Coding an advanced port scanner part 2 - 8:48
    • Finishing and testing our scanner - 8:55
    • Configuring IP address and installing Metasploitable - 8:13
    • Returning banner from open port - 14:45
    • Coding a vulnerability scanner part 1 - 11:55
    • Coding a vulnerability scanner part 2 - 7:19
  • SSH and FTP Attacks
    • Automating SSH login part 1 - 9:54
    • Automating SSH login part 2 - 9:20
    • Testing our SSH login program - 8:34
    • Coding SSH brute-forcer - 10:37
    • Executing commands on target after brute-forcing SSH - 10:09
    • Anonymous FTP login attack - 9:53
    • Username and password list attack on FTP - 17:32
  • Password Cracking
    • SHA256, SHA512, MD5 - 8:37
    • Cracking SHA1 hash with online dictionary - 16:40
    • Getting password from MD5 hash - 13:22
    • Cracking crypt passwords with Salt - 24:02
  • Sniffers, Flooders and Spoofers
    • Changing MAC address manually - 8:34
    • Coding MAC address changer - 16:56
    • Theory behind ARP spoofing - 4:42
    • Crafting malicious ARP packet - 19:26
    • Coding ARP spoofer - 13:31
    • Forwarding packets and restoring ARP tables - 8:04
    • Spoofing our IP address and sending message with TCP payload - 12:01
    • Running SynFlooder with changed source IP address - 11:20
    • Getting source and destination MAC address from received packets - 24:45
    • Sniffing FTP username and password part 1 - 8:09
    • Sniffing FTP username and password part 2 - 12:09
    • Getting passwords from HTTP websites - 14:01
  • Coding DNS Spoofer
    • Cloning any webpage - 10:36
    • Printing DNS queries - 9:57
    • Redirecting response to cloned page - 16:44
    • Setting IP table rules and running DNS spoofer - 10:35
  • Network Analysis
    • Analyzing ethernet header - 16:07
    • Analyzing IP header part 1 - 10:24
    • Analyzing IP header part 2 - 25:34
    • Analyzing TCP header - 15:13
    • Analyzing UDP header - 13:20
  • Multi-functioning Reverse Shell
    • Theory behind socket programming - 7:20
    • Wine and Pyinstaller installation - 7:41
    • Setting up listener - 8:17
    • Establishing connection between target and server - 6:31
    • Implementing send and receive functions - 11:28
    • Executing commands on target system - 11:43
    • Importing JSON library to parse data - 8:19
    • Converting Python backdoor to .exe - 8:14
    • Using OS library to change directory - 9:58
    • Downloading and uploading files to target PC - 19:07
    • Hiding our backdoor and creating persistence - 13:49
    • Trying to connect to server every 20 seconds - 7:52
    • Downloading files to target PC - 11:49
    • Capturing screenshot on target PC - 23:04
    • Administrator privilege check - 8:14
    • Starting other programs with our shell - 10:44
    • Running our shell as an image, audio, PDF - 20:05
  • Coding a Keylogger
    • Installing Pynput - 6:19
    • Printing space character - 8:48
    • Calling timer on our keylogger - 9:56
    • Adding keylogger to our backdoor - 12:58
  • Command and Control Center
    • What is a threaded server? - 5:05
    • Accepting connections with a thread - 13:11
    • Managing multiple sessions - 8:39
    • Testing threaded server with Windows 10 target - 9:04
    • Fixing Q command - 11:11
    • Coding exit function - 13:51
    • Attacking multiple targets and gathering botnet - 16:26
  • Website Penetration Testing
    • Stealing saved wireless passwords - 21:55
    • Saving passwords to a file - 3:02
    • Bruteforcing Gmail - 10:13
    • Bruteforcing any login page part 1 - 12:59
    • Bruteforcing any login page part 2 - 10:07
    • Finding hidden directories part 1 - 5:10
    • Finding hidden directories part 2 - 6:36
    • Discovering subdomains - 11:32
    • Changing HTTP headers - 13:56
    • Starting basic and digest authentication bruteforcer - 10:23
    • Controlling threads - 8:35
    • Coding run function - 10:06
    • Printing usage and testing our program - 12:33
    • Taking a look at ransomware - 8:20

View Full Curriculum


Access
Lifetime
Content
14.0 hours
Lessons
133

TOTAL: CompTIA PenTest+ (PT0-002)

Learn Ethical Hacking Skills & Take Your Next Step in the CompTIA Cybersecurity Pathway

By Total Seminars | in Online Courses

Whether you're looking to pass the CompTIA PenTest+ certification exam, take your next step in the CompTIA Cybersecurity Pathway, or you're just looking to learn some awesome ethical hacking skills, you’re in the right place. Keep in mind there's much more to being an ethical hacker than what's covered here, including how to secure a network, however, this course focuses on how to be a pen tester. A pen tester plans and scopes a pen test engagement with a client, finds vulnerabilities, exploits them to get into a network, then reports on those findings to the client.

4.6/5 average rating: ★ ★ ★ ★

  • Access 133 lectures & 14 hours of content 24/7
  • Scan networks, crack passwords, analyze & intercept traffic, discover code vulnerabilities, and compromise resources
  • Recognize vulnerabilities within a system, run exploits & suggest solutions to a client to remediate the weak points
  • Work within a virtual environment to practice your pen testing skills, including using Oracle VM manager, Kali Linux, Metasploitable & DVWA
  • Scope, plan & execute a pen test engagement from start to finish

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Total Seminars | Home of Mike Meyers and His Team of IT Certification Pros
4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI, and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars website.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • It’s recommended to be familiar with the information in the CompTIA Network+ and Security+ exams

Course Outline

  • Introduction to Ethical Hacking & CompTIA PenTest+ (PT0-002)
    • Introduction to the CompTIA PenTest+ (PT0-002) Course - 2:09
    • About the CompTIA PenTest+ (PT0-002) Exam - 7:21
  • Planning and Engagement
    • Planning a Pen Test - 8:21
    • Rules of Engagement - 10:28
    • Regulatory Compliance - 4:23
    • Resources and Budgets - 7:07
    • Impact and Constraints - 5:06
    • Support Resources - 13:14
    • Legal Groundwork - 11:43
    • Service Provider Agreements - 2:12
    • Standards and Methodologies, Part 1 - 6:48
    • Standards and Methodologies, Part 2 - 9:17
    • Environmental and Scoping Considerations - 13:38
    • Ethical Mindset - 5:36
    • Lab Environment Setup - 17:32
    • Project Strategy and Risk - 9:12
    • Scope Vulnerabilities - 13:19
    • Compliance-Based Assessments - 4:08
    • Chapter 1 Quiz
  • Information Gathering and Vulnerability Scanning
    • Scanning and Enumeration - 4:16
    • Scanning and Demo - 10:46
    • Packet Investigation - 7:57
    • Packet Inspection Demo - 5:48
    • Labtainers Setup - 12:09
    • Labtainers Lab (Wireshark) - 8:54
    • Application and Open-Source Resources - 11:38
    • Passive Reconnaissance - 10:07
    • Active Reconnaissance - 7:50
    • Vulnerability Scanning - 8:41
    • Vulnerability Scanning Demo - 16:20
    • Labtainers Lab (Network Basics) - 2:50
    • Labtainers Lab (Nmap Discovery) - 3:12
    • Target Considerations - 15:36
    • Analyzing Scan Output - 5:01
    • Nmap Scoping and Output Options - 21:04
    • Nmap Timing and Performance Options - 6:31
    • Prioritization of Vulnerabilities - 9:07
    • Common Attack Techniques - 12:05
    • Automating Vulnerability Scans - 3:35
    • Credential Attacks - 14:31
    • Labtainers Lab (Password Cracking) - 2:23
    • Labtainers Lab (Secure Socket Layers) - 2:30
    • Labtainers Lab (Routing Basics) - 1:59
    • Chapter 2 Quiz
  • Network-Based Attacks
    • Exploit Resources and Network Attacks - 4:37
    • Network-Based Exploits - 7:07
    • FTP Exploit Demo - 8:14
    • Man-in-the-Middle Exploits - 7:06
    • Labtainers Lab (TCP/IP Attacks) - 2:09
    • Labtainers Lab (ARP Spoof Attack) - 1:53
    • Labtainers Lab (Local DNS Attacks) - 1:47
    • Labtainers Lab (MACs and Hash Functions) - 1:19
    • Chapter 3 Quiz
  • Wireless and RF Attacks
    • Wireless Exploits - 13:17
    • Wireless Exploits, Part 2 - 2:46
    • Antennas - 3:48
    • Chapter 4 Quiz
  • Reporting and Communication
    • OWASP Top 10 - 8:40
    • Application Exploits, Part 1 - 5:34
    • SQL Injection Demo - 8:41
    • Labtainers Lab (SQL Injection) - 2:38
    • Application Exploits, Part 2 - 8:02
    • Application Exploits, Part 3 - 9:11
    • Cross-Site Scripting Demo - 7:00
    • Labtainers Lab (Cross-Site Scripting) - 1:36
    • Labtainers Lab (Cross-Site Request Forgery) - 1:14
    • Code Vulnerabilities - 16:36
    • API Attacks and Attack Resources - 6:28
    • Privilege Escalation (Linux) - 9:37
    • Privilege Escalation (Windows) - 6:09
    • Misc. Privilege Escalation - 7:54
    • Misc. Local Host Vulnerabilities - 8:05
    • Chapter 5 Quiz
  • Attacking the Cloud
    • Cloud Attacks, Part 1 - 4:50
    • Cloud Attacks, Part 2 - 4:39
    • Chapter 6 Quiz
  • Specialized and Fragile Systems
    • Mobile Attacks - 10:25
    • IoT Attacks - 10:18
    • Data Storage and Management Interface Attacks - 8:58
    • Virtual and Containerized Environment Attacks - 7:31
    • Labtainers Lab (Industrial Control System) - 1:51
    • Chapter 7 Quiz
  • Social Engineering and Physical Attacks
    • Pretext for a Social Engineering Attack - 2:31
    • Remote Social Engineering - 6:10
    • Spear Phishing Demo - 10:09
    • In-Person Social Engineering - 11:45
    • Physical Security - 11:17
    • Chapter 8 Quiz
  • Post-Exploitation
    • Post-Exploitation Techniques - 11:07
    • Post-Exploitation Tools - 3:22
    • Network Segmentation Testing - 3:00
    • Persistence and Stealth - 10:45
    • Detection Avoidance Techniques - 6:16
    • Chapter 9 Quiz
  • Post-Engagement Activities
    • Report Writing - 14:47
    • Important Components of Written Reports - 2:37
    • Mitigation Strategies - 5:00
    • Technical and Physical Controls - 3:46
    • Administrative and Operational Controls - 5:10
    • Communication - 8:38
    • Presentation of Findings - 2:57
    • Post-Report Activities - 5:23
    • Data Destruction Process - 1:37
    • Chapter 10 Quiz
  • Tools and Programming
    • Using Scripting in Pen Testing - 12:32
    • Bash Scripting Basics - 14:55
    • Bash Scripting Techniques - 10:11
    • PowerShell Scripts - 4:02
    • Ruby Scripts - 6:32
    • Python Scripts - 5:45
    • Scripting Languages Comparison - 10:56
    • Data Structures, Part 1 - 7:41
    • Data Structures, Part 2 - 8:12
    • Libraries - 3:03
    • Classes - 8:05
    • Procedures and Functions - 5:48
    • Perl and Javascript - 5:41
    • Chapter 11 Quiz
  • Tools Inventory
    • Pen Testing Toolbox - 6:46
    • Using Kali Linux - 6:14
    • Scanners and Credential Tools - 9:52
    • Code Cracking Tools - 4:20
    • Open Source Research Tools - 6:21
    • Wireless and Web Pen Testing Tools - 10:48
    • Remote Access Tools - 6:15
    • Analyzers and Mobile Pen Testing Tools - 2:29
    • Other Pen Testing Tools - 4:19
    • Labtainers Lab (Metasploit Framework) - 2:00
    • Labtainers Lab (Wireshark Packet Inspection) - 1:44
    • Labtainers Lab (SSH) - 0:58
    • Scanners, Debuggers, and Wireless Tools - 9:51
    • Web, Steganography, and Cloud Tools - 9:08
    • Chapter 12 Quiz

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.