Udemy

Platform

English

Language

Network & Security

Category

Intermediate Ethical Hacking Hands-on Training

Intermediate Ethical Hacking Hands-on Training, an intermediate hands-on course for learning ethical hacking.

4.54 (185 reviews)

Students

8.5 hours

Content

Jun 2021

Last Update
Regular Price

BLUE HOST
Blue Host
Fast, easy, and secure WordPress hosting in minutes + 1 free domain name
65%OFF : $2.95/month

What you will learn

Web Application Attacks

Wireless Network Attacks

Python scripting for pentesters


Description

Alert -

Intermediate Ethical Hacking Hands-on Training is a continuation of Ethical Hacking - Hands-on Training Part I. Before taking this course, students should have completed an introduction to an ethical hacking or pentesting course. For best results, students should have completed Ethical Hacking - Hands-on Training Part I before signing up for the intermediate course. 

Intermediate Ethical Hacking Hands-on Training picks up where Part I leaves off. In Part I, students were taught the fundamentals of pentesting while being introduced to some basic skills.

Intermediate Ethical Hacking Hands-On Training provides an intermediate level of white, grey, and black hat skills every cybersecurity professional needs to know.  Advanced reconnaissance techniques are taught using the NMap scripting engine and various hacking tools used by pentesters.

Sections include Web Application Attacks, Wireless Network Attacks, PowerShell Empire, Netcat, and Wireshark Fundamentals.

For the best experience in learning to be an ethical hacker or pentester, students should complete the instructor's complete series on ethical hacking, starting with Ethical Hacking Hands-On Training Part I and proceeding to this intermediate course.

The three Ethical Hacking Capture the Flag Courses are the capstone series where students apply and use all the techniques taught in the two Ethical hacking courses.

By the end of the course, you will have a deep understanding of external and internal network penetration testing, wireless penetration testing, and web application penetration testing. The lab exercises in the course are based on real-world application of Red Team best practices.


Screenshots

Intermediate Ethical Hacking Hands-on Training
Intermediate Ethical Hacking Hands-on Training
Intermediate Ethical Hacking Hands-on Training
Intermediate Ethical Hacking Hands-on Training

Content

Course Overview

Course Overview

Virtual Lab Build

Creating a Virtual install of Kali using VirtualBox

Create a virtual install of Metasploitable2

Installing the VirtualBox Extension Pack

Video and Lab - Install Additional Tools Using Katoolin3

Anonymity - Remaining Anonymous While Pentesting

Video and Lab - Anonymize Kali Using Whonix

NMap

Video and Lab - Installing the WebMap-Nmap Dashboard

Video and Lab – Automated Recon/Enumeration Using nmapAutomator

Reverse Shells

Video and Lab – Create a Reverse Shell Using Command Injection

Video Lab - Create a Reverse Shell Using a File Upload

Video and Lab - Upgrade a Dumb Terminal to Fully Functional BASH Shell

Auditing Wireless Networks

Video and Lab - Installing a Wireless Adapter in Kali

Video and Lab - Hacking a Wireless Network Using Kali Linux

Video and Lab - Wireless Deauthentication Attack

Video and Lab - PMKID Client-less Wireless Attack Using Bettercap

Wireshark

Video - Overview of Wireshark 3.2

Video - Wireshark Capture Options

Video - Wireshark Toolbar Icons

Video and Lab - Capturing a 3-way TCP Handshake Using Wireshark

Video - Capturing Wireless Traffic Using Wireshark

Web App Penetration Testing

Video and Lab - Creating a virtual install of OWASP

Video - Setting Up Burp Suite

Video - Web Application Firewall Detection Using WAFW00F

Video and Lab – Exploit Vulnerable Web Applications Using Command Injection

CTF - SQL Injection to Shell Walkthrough

Video and lab - Lab preparation

Video - CTF Walkthrough - SQL Injection to Shell


Reviews

L
Libor21 December 2020

Important and complex topics, including their framework, various aspects, and even alternatives, explained in a clear, systematic, and structured way. The course helps understand the area better, from concepts through installation, settings, to implementation. The resources explain every lesson, each step, with high precision and with annotated screenshots, a unique approach.

S
Snazzy18 November 2020

So far so good. I just started this course and I can see that it's gonna be a lotta fun. The instructor is really knowledgeable and experienced and from watching I can tell that he knows how to convey his information to his students.


Coupons

DateDiscountStatus
11/18/2020100% OFFExpired
12/27/2020100% OFFExpired
3/24/2021100% OFFExpired

3452562

Udemy ID

8/27/2020

Course created date

11/18/2020

Course Indexed date
Bot
Course Submitted by