Udemy - Network Penetration Testing (Ethical Hacking) From Scratch
This course aims to teach student's how to become an ethical hacker/penetration tester from a networking perspective from scratch, therefore prior knowledge of the fundamentals of networking and basic Linux commands would be beneficial but not essential. The course covers the entire process of network based ethical hacking from a professional penetration testers point of view.
Description
The introductory areas coverthe ethics and jurisdictional pointssurrounding penetration testing a client network. The next sections include integral passive and activeinformation gathering functions when conducting a client engagement.
The course then looks into the various exploitationtechniques a hacker would use and accompaniesdetailed demonstrations of how to find and exploit such issues. Once exploited, the course then looks at post exploitation methods. This includesways in which an attacker can further exploit the client to gain access to other areas of the network as well as maintain access once exploited.
Finally the course focuses on additional techniques anethical hacker would take once they havealreadygainedcontrol ofa client network and therefore useperspectives such as networking tools similar toWireshark orTCPDump. In addition other entry points would includehardware tools that can be used forexploitationsuch asWiFi related hacking, which is only covered from a theoretical point of view within this course.
This course is perfect for anyone who is looking for a primer for more expensive ethical hacking certifications such as OSCP, CEH, and the technical element of CISSP.
Who this course is for:
- Beginner level students who are interested in the world of ethical hacking and penetration testing
Course content
- Introduction
- Course Syllabus
- Introduction to Penetration Testing
- Reporting For a Client
- Glossary of Terms - Part 1
- Glossary of Terms - Part 2
- Legal Considerations
- Legal Considerations Part 1
- Legal Considerations Part 2
- Setting up Your Environment
- Various Tools for Ethical Hacking
- Setting Up Kali- Part 1
- Setting Up Kali- Part 2
- Setting Up Ethical Hacking Tools In Mac OS - Part 1
- Setting Up Ethical Hacking Tools In Mac OS - Part 2
- Vulnhub and Metasploitable 2
- Cloud Services Part 1
- Cloud Services Part 2
- Taking Notes For Client Engagements
- FTP and SFTP
- Running an Apache Web Server and Passing Files Between a Client and Attacker
- Passive Information Gathering
- Passive Information Gathering - Part 1
- Passive Information Gathering - Part 2
- Searching For Personnel During a Client Engagement
- Active Information Gathering
- Cewl - Collecting Information From a Client Website
- Nmap - Scanning a Client Network
- Nmap - Using The Scripting Engine
- Nikto - Searching for Web Based Vulnerabilities
- Openvas - Scanning For Network/Website Related Vulnerabilities
- Dirb/Dirbuster - Brute Forcing Web Directories
- Metasploit - Using the Scanning Based Modules - Part 1
- Metasploit - Using the Scanning Based Modules - Part 2
- Ncat - Banner Grabbing - Part 1
- Ncat - Banner Grabbing - Part 2
- DNS Enumeration - Part 1
- DNS Enumeration - Part 2
- SMB Enumeration
- Exploitation
- How to Search For Exploits
- Metasploit - Exploit
- Metasploit - Payload
- MSFvenom - Creating a custom payload
- Burpsuite - Web Proxy
- Zap - Web Proxy
- SQL Injection - How to
- SQL Injection - NoSQL How to
- Pret - Exploiting Printers
- LFI & RFI - Local File Inclusion & Remote File Inclusion
- Veil - Evading Anti Virus - Part 1
- Veil - Evading Anti Virus - Part 2
- Using a Reverse Shell - Part 1
- Using a Reverse Shell - Part 2
- Patator - Password Attacks - Part 1
- Patator - Password Attacks - Part 2
- BOF - What is a Buffer Overflow
- BOF - Buffer Overflow Demo - Part 1
- BOF - Buffer Overflow Demo - Part 2
- BOF - Buffer Overflow Demo - Part 3
- Phishing - What is Phishing and Tools Used for Phishing
- Post Exploitation
- Windows Machine - Part 1
- Windows Machine - Part 2
- Linux Machine Part 1
- Linux Machine Part 2
- Mimikatz - Extracting Hashes From Memory
- FGdump - Extracting Password Hashes
- Cracking Hashes
- Pivoting - Part 1
- Pivoting - Part 2
- Persistance - Maintaining Access to a Client Machine
- Other Techniques
- Wireshark - Part 1
- Wireshark - Part 2
- TCPDump
- Hardware - Part 1
- Hardware - Part 2
Network_Penetration_Testing__Ethical_Hacking__From_Scratch.part1.rar
Network_Penetration_Testing__Ethical_Hacking__From_Scratch.part2.rar
Network_Penetration_Testing__Ethical_Hacking__From_Scratch.part3.rar
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.