Advanced Ethical Hacking

In-depth course which covers the tools and techniques for performing penetration testing.
4.5 (1 rating) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
58 students enrolled
$40
Take This Course
  • Lectures 100
  • Length 6.5 hours
  • Skill Level Expert Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 10/2013 English

Course Description

This Advanced Ethical Hacking course from VTC will provide direction on tools and techniques for performing ethical hacking (also known as penetration testing). Author Ric Messier will cover Nessus, Nexpose, Nmap, and Metasploit, as well as manual testing techniques. He will also demonstrate Web Application Testing and various tools that will assist in that effort. This title is a self-paced software training course delivered via pre-recorded video. We do not provide additional information outside of the posted content.

What are the requirements?

  • n/a

What am I going to get from this course?

  • Learn tools and techniques for performing ethical hacking (also known as penetration testing).

What is the target audience?

  • Computer and Network Experts

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
Welcome
Preview
01:09
What This Course Will Cover
Preview
02:16
System Requirements
Preview
03:19
Prerequisites
Preview
02:53
Section 2: Dradis: Results Tracking
Acquiring Dradis
Preview
04:24
Installing Dradis
Preview
02:31
Using Dradis
Preview
04:01
Adding Notes
Preview
02:50
Categorizing Information
Preview
04:10
Section 3: Nmap
Review of Scan Types
Preview
04:36
Advanced Scanning
Preview
05:14
Scripting Engine
Preview
05:03
Investigating Scan Types with Wireshark
Preview
05:32
Importing Results to Dradis
Preview
03:17
Section 4: Nessus
Acquiring Nessus
02:22
Setting Up Nessus
04:02
Configuring Nessus
04:29
Scan Details: Network
04:12
Scan Details: Credentials / Plugins / Options
04:25
Scan Details: Web Applications
05:54
Starting a Scan
03:45
Reviewing Results
04:49
False Positives
03:27
Setting Up Jobs
02:48
Section 5: Nexpose
Acquiring Nexpose
03:02
Setting Up Nexpose
02:13
Configuring Nexpose
04:21
Adding Hosts to Nexpose
03:28
Reviewing Results & Manual Checks
03:29
Section 6: Manual Testing
Netcat
04:22
Protocol Checking
07:52
SSL_Client
04:48
SSLScan
04:36
Nikto
04:59
Snmpwalk
04:00
Section 7: Metasploit
Acquiring Metasploit
02:32
Setting Up Metasploit
02:01
Metasploit Web Interface
03:26
Configuring Workspaces
02:44
Running Nmap from Metasploit
03:34
Importing Nessus Results
02:43
Scanning with Metasploit
03:51
Looking at Vulnerabilities
02:48
Searching for Vulnerabilities
02:09
Running Exploits
02:33
Post Exploitation Data Gathering
04:08
Pivoting & Tunneling
03:18
Writing an MSF Plugin
06:11
Writing Fuzzers
06:17
Social Engineering Toolkit
02:05
Spear Phishing
05:53
Section 8: Simple Web Application Testing
Browser Plugins with Chrome
04:20
Browser Plugins with Firefox
03:49
Tamperdata
04:36
Performing Injections with Tamperdata
02:42
Cookie Data with Tamperdata
05:54
SQL Inject Me
03:25
XSS Me
03:25
Firebug
04:30
Hackbar
04:00
Wappalyzer
03:47
Passiverecon
04:05
Groundspeed
03:53
Section 9: Webgoat
Acquiring Webgoat
02:50
Practicing Web Application Attacks
02:33
Basics of Webgoat
03:04
Working Through Lessons
04:27
Section 10: Burpsuite
Acquiring Burpsuite
01:32
Installing Burpsuite
01:57
Running Burpsuite & Configuring Your Browser
02:48
Spidering
03:15
Passive Scanning
03:09
Active Scanning
03:19
Investigating Results
06:32
Password Attacks
05:19
Fuzzing Attacks
06:40
Doing Sequencing
04:34
Using the Intruder
05:55
Section 11: Other Web Tools
Acquiring W3Af
02:17
Installing W3Af
02:11
Running W3Af
02:47
Configuring W3Af
04:28
Acquiring & Configuring Zed Attack Proxy (ZAP)
02:49
Quick Start with ZAP
02:49
Scanning with ZAP
03:05
Spidering with ZAP
02:39
Fuzzing With ZAP
03:30
Section 12: Injection Attacks
Web Architecture
03:15

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

VTC Software Training, Affordable, Comprehensive Software Training

VTC is one of the world's leading producers of online computer and software training, supplying richly diverse courses of informative and inspiring tutorials. Created on the idea that anyone should have the ability to learn to use computer software on their own time, VTC has produced tens of thousands of hours of extraordinarily valuable, insightful, and easy to follow tutorials and delivers them for a fraction of the cost of other training methods. Our training authors are some of the most accomplished in their respective fields. The tutorials that could make the difference in your new job, promotion, or school advancement are always available and only a click away.

Ready to start learning?
Take This Course