Udemy- Learn The Basics of Ethical Hacking and Penetration Testingseeders: 2
leechers: 58
Udemy- Learn The Basics of Ethical Hacking and Penetration Testing (Size: 3.15 GB)
Descriptionhttps://www.udemy.com/learn-the-basics-of-ethical-hacking-and-penetration-testing/ LEARN The Secrets and The Arts of Penetration Testing The best course to start your journey in the penetration testing and ethical hacking world You will learn many NEW and AMAZING Things like: Gather Information Intelligence You will learn how to find and gather important information about your target during penetration testing. Find Web Applications and Systems Security Vulnerabilities You will learn how to find and exploit web application vulnerabilities like: SQL Injection, XSS and more. Scan Your Target Stealthy You will learn how to use Nmap to scan targets protected by IDS and how to bypass them. Exploit Web applications and System vulnerabilities You will learn how to take over Windows, Linux targets and how to exploit most of Web Vulnerabilities to gain system access. Real World Client Side Attacks You will learn how to hack people using modern web browsers to gain access to their systems. Tactical Post Exploitation on windows and linux systems You will not stop after hacking a system but you will learn how to take more advantage of a hacked system and collect more important information Develop Windows Exploits You will learn how to Create an exploit for a FTP program from scratch using python, immunity debugger and how to convert it to metasploit exploit module. Ask and we will answer your questions within 24 hours Just ask about anything about the course and we will answer you within 24 hours. 17 hours HD hands-on penetration testing videos You will get 17 Hours of High Definition Practical Penetration Testing videos with 20% theory and 80% Hands On. Use The most powerful tools You will learn how to use powerful tools like: Metasploit, SQLMap, Havij, Nmap and much more! You will have FUN You will enjoy every single minute of our course during your journey to learn real world penetration testing and ethical hacking techniques. SECTION 1: Solid Introduction to Ethical Hacking and Penetration Testing 1) About the course 03:22 2) Hacking vs Ethical Hacking 03:25 3) Who is a Hacker ? 02:14 4) Types of Hackers 10:28 5) Hacktivism 02:30 6) Computer Crimes 05:11 7) Important Terms 1 06:19 8) Important Terms 2 06:52 9) Why Penetration Testing ? 02:45 10) Penetration Testing Types 04:39 SECTION 2: Real World Information Intelligence Techniques 11) Introduction to Information Intelligence Techniques 03:34 12) organizing information during a penetration test 06:01 13) how to locally copying company websites 05:50 14) newsgroups and list-servers 05:11 15) online job listing 03:26 16) the power of social media websites 03:36 17) harvesting a company emails 09:15 18) how to generate a targeted wordlist for password cracking 03:13 1) information intelligence with Maltego 04:06 20) Google Search Techniques for penetration testers 16:50 21) other search engines for penetration testers 04:12 22) Enumerating Internal Network From Outside 05:51 23) gather information using WhatWeb, HttpRecon and SSL SCAN 09:25 24) Whois Lookups, finding other Web Sites Hosted on a Web Server 04:18 25) IP Address Geolocation 04:08 26) finding subdomains, extracting exif data and finding hidden web dirs 10:15 27) ShodanHQ for fun and profit 06:57 28) Web Application Firewall Detection, HTTP and DNS load balancer detection 15:35 29) DNS Enumerating for penetration testers 26:37 30) Mail Server Enumeration for penetration testers 07:36 31) Intel Gathering Methodology for penetration testers 02:22 SECTION 3: Scanning and vulnerability Assessment 32) packet Crafting and Manipulating with Scapy 13:41 33) port scanning with scapy 06:19 34) Network Enumeration and Mapping Techniques 09:24 35) Network scanning techniques 47:35 36) Vulnerability Identification and Assessment techniques 31:22 37) Practical Evasion and avoidance Techniques 19:37 SECTION 4: Network Attacking Techniques 38) Password cracking, MITM, Sniffing SSL and RDP Attacks 49:21 SECTION 5: Windows and Linux Attacking Techniques 39) Windows Security Overview for Penetration Testers 34:54 40) Linux Security Overview for Penetration Testers 20:20 41) Attacking and Hacking Windows 58:32 42) Attacking and Hacking Linux 16:37 SECTION 6: Windows and Linux Post-Exploitation Techniques 43) Windows post exploitation techniques 01:04:51 44) Linux post exploitation techniques 23:51 45) Data mining techniques 03:03 SECTION 7: Web Exploitation Techniques 46) Web Application Primer 28:33 47) Web Application Scanning and Mapping 20:34 48) Exploiting SQL Injection to Full System Access (MYSQL) 01:02:02 49) Exploiting SQL Injection to Full System Access (MSSQL) 28:20 50) Exploiting Blind SQL Injection to Full System Access (MYSQL) 13:50 51) Exploiting Blind SQL Injection to Full System Access (MSSQL) 48:58 52) Exploiting RFI, Local File include, File Uploads and RCE 35:06 53) Exploiting XSS ( Reflected and Stored ) and CSRF to Full System Access 01:01:13 SECTION 8: Windows Exploit Development 54) Using Immunity Debugger and Metasploit to develop a windows exploit 02:05:59 SECTION 9: The end but it is not the end 55) The end Sharing WidgetAll Comments |
1)https://www.udemy.com/android-app-development-fundamentals-i-second-edition/
2)https://www.udemy.com/android-app-development-fundamentals-ii-second-edition/
I need these course .
Thanks for ur effort ..... :)