Penetration Testing Unveiled: Ethical Hacking & Pentesting

Cyber Range | Penetration | Intrusion Analysis | Vulnerability Testing | Virtual Machines (VM) | Labs | Quizzes

4.25 (142 reviews)
Udemy
platform
English
language
Operating Systems
category
Penetration Testing Unveiled: Ethical Hacking & Pentesting
35,184
students
3 hours
content
Jan 2023
last update
$54.99
regular price

What you will learn

Learn the motives and mindset of an attacker

Carry out the penetration testing methodology like a professional

Explore methods to attack devices and servers

Investigate the process of attacking the client side of the network

Explore penetration testing

Experience the process of identifying weaknesses and then attacking them

Learn techniques to penetrate perimeter devices

Explore the challenge of defeating enterprise defenses

Practice a multitude of evasion tactics

Perform penetration testing by using client side tactics

Compete against a live progressive target range

Enhance your professional security testing skills

Develop a roadmap to becoming a professional penetration tester

Description

To effectively secure the networks of today requires the establishment of the hacker mindset. That is, you have to attack your own network to learn how to defend it. A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.

In this course you learn how to conduct a pentest and what cybersecurity is all about.  You will learn how to build and hone the skills to create that mindset of someone who has the sole purpose of attacking a system and/or network. Following the initial skill development, you will learn the process and methodology of professional penetration testing.

You will build the skills and apply techniques to penetrate devices, servers, and clients. Each day you will be presented a scope of work and have a number of targets to engage and attempt to “own.” The targets will be progressive in nature with the size of the attack surface being reduced as your skill sets increase.

By the time you leave the course, you will have performed a number of simulated professional penetration testing engagements as well as drafted a preliminary report of findings. The processes and techniques you will be exposed to have been used to train a number of global penetration testing teams. The system is proven and effective and can be put into place at once.

Your instructor, Kevin Cardwell, is a former senior U.S. Navy cybersecurity expert and the author of multiple books on cybersecurity.

More about this course and Starweaver

This course is led by a seasoned technology industry practitioner and executive, with many years of hands-on, in-the-trenches cybersecurity work. It has been designed, produced and delivered by Starweaver. Starweaver is one of the most highly regarded, well-established training providers in the world, providing training courses to many of the leading financial institutions and technology companies, including:

Ahli United Bank; Mashreqbank; American Express; ANZ Bank; ATT; Banco Votorantim; Bank of America; Bank of America Global Markets; Bank of America Private Bank; Barclay Bank; BMO Financial Group; BMO Financial Services; BNP Paribas; Boeing; Cigna; Citibank; Cognizant; Commerzbank; Credit Lyonnais/Calyon; Electrosonic; Farm Credit Administration; Fifth Third Bank; GENPACT; GEP Software; GLG Group; Hartford; HCL; HCL; Helaba; HSBC; HSBC Corporate Bank; HSBC India; HSBC Private Bank; Legal & General; National Australia Bank; Nomura Securities; PNC Financial Services Group; Quintiles; RAK Bank; Regions Bank; Royal Bank of Canada; Royal Bank of Scotland; Santander Corporate Bank; Tata Consultancy Services; Union Bank; ValueMomentum; Wells Fargo; Wells Fargo India Solutions; Westpac Corporate Bank; Wipro; and, many others.

Starweaver has and continues to deliver 1000s of live in-person and online education for organizational training programs for new hires and induction, as well as mid-career and senior-level immersion and leadership courses.

If you are looking for live streaming education or want to understand what courses might be best for you in technology or business, just google:

Starweaver journey builder starweaver[dot]com

Happy learning.

Content

Module Zero

Segment - 01 - Building the Cyber Range
Segment - 02 - Multiple Layers and Switches
Segment - 03 - Customizing IP Addresses
Segment - 04 - Finding and Building Your Own Machine
Segment - 05 - Building and Advanced Range

Module One

Segment - 06 - The Process of Penetration Testing

Module Three

Segment - 07 - The Abstract Methodology
Segment - 08 - Planning
Segment - 09 - Intrusive Target Search and Scanning Methodology
Segment - 10 - Network Mapping and Nmap
Segment - 11 - Understanding Open Ports
Segment - 12 - Services Running on Ports
Segment - 13 - Enumeration

Module Three

Segment - 14 - Identification of Vulnerabilities Manual
Segment - 15 - Identification of Vulnerabilities Manual Dups
Segment - 16 - Openvas

Module Four

Segment - 17 - Validation of Vulnerabilities
Segment - 18 - Exploit Tools and Distributions

Module Five

Segment - 19 - Data Analysis Review
Segment - 20 - Reporting and Showcasing Results

Labs Module One

Lab 01 - Part 01 Setting Up a Flat Network
Lab 01 - Part 02 - Understanding Virtual Box
Lab 01 - Part 03 - VM Workstation Player
Lab 02 - Part 01 - Setting Up Multiple Layer
Lab 02 - Part 02 - Virtual Box
Lab 02 - Part 03 - VMware Player Methods
Lab 03 - Customizing Your IP Addresses
Lab 04 - Building Your Own Machine Kioptrix
Lab 05 - Setting Up The Advanced Range

Labs Module Two

Lab 01 - Instrusive Target Search
Lab 02 - Scanning Live Systems
Lab 03 - Ports
Lab 04 - Services Scan
Lab 05 - Enumeration

Labs Module Three

Lab 01 - Vulnerability Sites
Lab 02 - Using Nmap
Lab 03 - Exploring Openvas
Lab 04 - Exploring Nessus
Lab 05 - Exploring Nikto

Labs Module Four

Lab 01 - Exploitdb
Lab 02 - Exploitdb Dups
Lab 03 - Tcpdump Data Analysis

Quizzes

Module One
Module Two
Module Three
Module Four
Module Five
Module Six

Reviews

Taj
December 22, 2022
Gives very informative explanations of what everything is, what they do/operate, and the various situations in which they may be applied. Also frames everything within context.
Himanshu
August 19, 2022
It was a very fantastic course with tons of knowledge. It was a great Experience!!! Recommended for sure.
Derek
June 28, 2022
Content was good for me since I'm a beginner when it comes to pen testing. Where I feel it could use improvement is the order arrangement of the videos. I was regularly having to jump from section to section in order to watch a lecture and then its corresponding demo back-to-back. Instead of having the lectures in one group, demos in another, and quizzes in a third, all the videos should be arranged by the module they represent. For example, the labs for setting up multiple layers should play right after the lecture on multiple layers.
Erwin
July 14, 2021
kursus yang sangat menyenangkan dan kami ingin mengikuti kursus yang instruktur adakan kembali, dan sangat berkesan sekali bagi kami. trimakasih buat instruktur dan salam sukses selalu
Sithum
July 14, 2021
Wow, amazing course. I recommend this course for all IT-related guys. But I'm not sure this is good for beginners. Actually, Kevin sir has explained all contents in detail. I love this course. Happy from Sri Lanka...??
James
December 30, 2020
This course is really loaded with content. I can't complain and recommend it to anyone looking to get into IT security. I'm enjoying every bit.
Fernando
December 30, 2020
Nice stuff. I love the short modules where Kevin gets right to the point in 3-5 minutes or so. Makes it easy for me to jump back and forth. Also, really like his style. Works for me.
Xavier
December 30, 2020
The classes are awesome! The instructor spoke very clear and was very knowledgeable and patient. Good curriculum
James
December 30, 2020
Definitely a great program. Kevin covers this material thoroughly and I'm learning a lot. I'm new to the cyber world but he is obviously a real expert. Thanks.

Coupons

DateDiscountStatus
12/31/2020100% OFF
expired
7/14/2021100% OFF
expired
8/14/2021100% OFF
expired
10/27/2021100% OFF
expired

Charts

Price

Penetration Testing Unveiled: Ethical Hacking & Pentesting - Price chart

Rating

Penetration Testing Unveiled: Ethical Hacking & Pentesting - Ratings chart

Enrollment distribution

Penetration Testing Unveiled: Ethical Hacking & Pentesting - Distribution chart

Related Topics

3709724
udemy ID
12/16/2020
course created date
12/31/2020
course indexed date
Bot
course submited by