MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 4.5 Hours | 6.54 GB
Genre: eLearning | Language: English
This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and basics of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, and exploitation. This course provides step-by-step real-life scenarios. You will see first hand how an ethical hacker performs initial reconnaissance of a victim and how to assess systems and network security controls security posture.
With over 10 hours of training that includes live discussions, demos, whiteboard instruction and screencasts, Security Penetration Testing Live Lessons provides expert insights of the methodologies used to assess and compromise a network. It covers the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired and wireless network and the systems within that network. The title also covers numerous types of attacks, along with security evasion and post exploitation techniques. You will additionally learn the art of social engineering, with special coverage of tools like the social engineering tool kit (SET), Metasploit, Maltego, and many more. After that you’ll take a look at guidelines for how to write a penetration testing report, with instructions for how to plan and organize those reports examples of reports including several best practices.
This course provides supplemental material to reinforce some of the critical concepts and techniques that the reader has learned and provides practice questions to assess their understanding of the topics. This material can be found at theartofhacking.org.
While there are a variety of ethical hacking and cybersecurity certifications out there, this course is meant to introduce people to the concepts behind ethical hacking and penetration testing and is certification agnostic.
Topics include:
Lesson 1: Overview of Ethical Hacking and Penetration Testing
Lesson 2: Kali Linux
Lesson 3: Passive Reconnaissance
Lesson 4: Active Reconnaissance
Lesson 5: Hacking Web Applications
Lesson 6: Hacking User Credentials
Lesson 7; Hacking Databases
Lesson 8: Hacking Networking Devices
Lesson 9: Fundamentals of Wireless Hacking
Lesson 10: Buffer Overflows
Lesson 11: Powershell Attacks
Lesson 12: Evasion and Post Exploitation Techniques
Lesson 13: Social Engineering
Lesson 14: Maintaining Persistence, Pivoting, and Data Exfiltration
Lesson 15: Writing Penetration Testing Reports
Security_Penetration_Testing__The_Art_of_Hacking_Series__LiveLessons.part2.rar - 1000.0 MB
Security_Penetration_Testing__The_Art_of_Hacking_Series__LiveLessons.part3.rar - 1000.0 MB
Security_Penetration_Testing__The_Art_of_Hacking_Series__LiveLessons.part4.rar - 1000.0 MB
Security_Penetration_Testing__The_Art_of_Hacking_Series__LiveLessons.part5.rar - 1000.0 MB
Security_Penetration_Testing__The_Art_of_Hacking_Series__LiveLessons.part6.rar - 1000.0 MB
Security_Penetration_Testing__The_Art_of_Hacking_Series__LiveLessons.part7.rar - 703.3 MB
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.