Advanced White Hat Hacking & Penetration Testing Tutorial

Learn how to test and protect your network using Ethical Hacking and Penetration Testing Techniques.
8 reviews
TAUGHT BY
  • Infinite Skills High Quality Training

    InfiniteSkills is a Canadian based company that offers an ever growing range of high quality eLearning solutions that teach using studio quality narrated videos backed-up with practical hands-on examples. The emphasis is on teaching real life skills that are essential in today's commercial environment. All InfiniteSkills courses are taught by experts who have a true passion for teaching.

WHAT'S INSIDE
  • Lifetime access to 78 lectures
  • 5+ hours of high quality content
  • A community of 4800+ students learning together!
SHARE

Advanced White Hat Hacking & Penetration Testing Tutorial

Learn how to test and protect your network using Ethical Hacking and Penetration Testing Techniques.
8 reviews

HOW UDEMY WORKS?

Discover courses made by experts from around the world.

Take your courses with you and learn anytime, anywhere.

Learn and practice real-world skills and achieve your goals.

COURSE DESCRIPTION

In this Advanced White Hat Hacking And Penetration Testing training course, Infinite Skills takes you beyond the basics of Ethical Hacking and shows you advanced techniques for discovering potential security problems with your websites and networks. This course requires that you already have familiarity with the basics of penetration testing, and assumes that you have already completed the Learning White Hat Hacking And Penetration Testing course from Infinite Skills.

The course jumps right into the nitty gritty with a chapter about using Dradis. You will learn about scanning, including stealth scanning, data acquisition using various methods, and advanced ways to utilize Metasploit. In this Ethical Hacking tutorial you also learn how to use Burp Suite to do web testing, what reverse engineering is and how to use it, and finally, Ric covers fuzzing with Peach.

Once you have completed this training course on Advanced White Hat Hacking And Penetration Testing, you will have an in-depth understanding of how to test networks and websites for potential exploits for the purpose of securing them. You will also know how to use the tools and software that you will need to perform and analyze this testing.

This White Hat Hacking course follows on from our Beginners White Hat Hacking Course

    • PC, Mac Or Linux
    • Over 78 lectures and 5 hours of content!
    • Learn How To Test For And Protect Your Network From Hackers
    • Build Robust Networks That Can Withstand Penetration From Unauthorized Access
    • Learn How To Defeat Hackers And Secure Your Hardware From Attack
    • Computer Professionals

THE UDEMY GUARANTEE

30 day money back guarantee
Lifetime access
Available on Desktop, iOs and Android
Certificate of completion

CURRICULUM

  • SECTION 1:
    01. Introduction
  • 1
    0101 What You Should Expect
    02:18
  • 2
    0102 What You Should Know
    04:49
  • 3
    0103 What You Will Learn
    04:04
  • 4
    0104 System Requirements
    02:34
  • 5
    HOW TO OBTAIN YOUR CERTIFICATE OF COMPLETION FOR THIS INFINITE SKILLS COURSE.
    Text
  • SECTION 2:
    02. Getting Organized
  • 6
    0201 Ethical Hacking
    04:05
  • 7
    0202 Dradis Framework
    02:47
  • 8
    0203 Using Notes With Dradis
    03:48
  • 9
    0204 Importing Data With Dradis :
    03:43
  • 10
    0205 Installing Plugins In Google Chrome
    05:04
  • 11
    0206 Installing Plugins In Mozilla Firefox
    04:42
  • 12
    0207 Raspberry PI
    03:06
  • 13
    0208 SSH Forwarding
    05:40
  • SECTION 3:
    03. Scanning
  • 14
    0301 Refresher On NMAP
    02:46
  • 15
    0302 Scan Types
    03:20
  • 16
    0303 Stealth Scanning
    04:01
  • 17
    0304 Application Scans Using AMAP
    03:28
  • 18
    0305 Web Testing With NMAP
    04:28
  • 19
    0306 Scanning And Scripting With NMAP And UDP
    03:58
  • 20
    0307 Scanning With Hping
    03:02
  • 21
    0308 Payload-Based Scanning With Unicorn Scan
    02:44
  • 22
    0309 TCP Scanning With Unicorn Scan
    04:10
  • SECTION 4:
    04. Data Acquisition
  • 23
    0401 Using Wappalyzer
    03:14
  • 24
    0402 Using Passive Recon
    04:55
  • 25
    0403 Using Firebug
    05:38
  • 26
    0404 Using Groundspeed
    05:22
  • 27
    0405 Converting With Hackbar
    02:40
  • 28
    0406 Managing Cookies
    04:35
  • SECTION 5:
    05. Metasploit
  • 29
    0501 Starting Up Metasploit
    02:40
  • 30
    0502 Scanning With Metasploit
    02:59
  • 31
    0503 Service Scanning With Metasploit
    04:58
  • 32
    0504 SMB Scanning With Metasploit
    06:23
  • 33
    0505 Importing Nessus Results
    05:15
  • 34
    0506 Creating Payloads
    05:36
  • 35
    0507 Creating Standalone Exploits
    03:18
  • 36
    0508 Encoding And Packing
    04:16
  • 37
    0509 Writing Fuzzers Using Metasploit
    06:44
  • 38
    0510 Exploits
    03:55
  • 39
    0511 Using Meterpreter
    03:08
  • 40
    0512 Post-Exploitation
    02:52
  • 41
    0513 Pivoting
    04:20
  • 42
    0514 Manipulating Windows API
    04:06
  • 43
    0515 Client Side Attacks
    06:32
  • 44
    0516 Social Engineering Toolkit
    02:25
  • 45
    0517 Spear Phishing
    03:32
  • 46
    0518 Web Attacks
    03:16
  • 47
    0519 Automating Metasploit
    03:22
  • 48
    0520 SQL Server Logins
    04:52
  • 49
    0521 Token Stealing
    02:51
  • 50
    0522 Extending Metasploit
    05:12
  • SECTION 6:
    06. Web Testing
  • 51
    0601 Running Burp Suite
    02:15
  • 52
    0602 Passive Scanning
    04:34
  • 53
    0603 Active Scanning
    04:53
  • 54
    0604 Using The Intruder
    02:41
  • 55
    0605 Brute Forcing Passwords
    03:33
  • 56
    0606 SQL Injection Testing With Burp Suite
    05:59
  • 57
    0607 Cross Site Scripting With Burp Suite
    04:57
  • 58
    0608 Using The Burp Suite Repeater
    03:07
  • 59
    0609 Using The Burp Suite Sequencer
    04:31
  • 60
    0610 XSS-Me
    04:13
  • 61
    0611 SQL-Inject Me
    03:51
  • 62
    0612 TamperData
    03:39
  • 63
    0613 Injection Attacks With TamperData
    04:05
  • 64
    0614 Hidden Form Fields
    03:09
  • 65
    0615 ZED Attack Proxy
    04:09
  • 66
    0616 Fuzzing With ZED Attack Proxy
    03:36
  • 67
    0617 Hackbar
    02:32
  • SECTION 7:
    07. Reverse Engineering
  • 68
    0701 Assembly Basics
    04:48
  • 69
    0702 Buffer Overflows
    04:37
  • 70
    0703 Format String Attacks
    03:24
  • 71
    0704 Debugging - Linux
    04:43
  • SECTION 8:
    08. Fuzzing
  • 72
    0801 Peach Fuzzer
    02:28
  • 73
    0802 HTTP Fuzzing With Peach
    04:55
  • 74
    0803 E-Mail Fuzzing With Peach
    05:08
  • 75
    0804 File And Network Fuzzing With Peach
    03:32
  • 76
    0805 Sulley
    04:44
  • 77
    0806 Spike Proxy
    02:52
  • SECTION 9:
    0901 Extending Your Learning
  • 78
    0901 Extending Your Learning
    04:05

UDEMY BY THE NUMBERS

5,200,000
Hours of video content
19,000,000
Course Enrollments
5,700,000
Students

RATING

  • 3
  • 2
  • 1
  • 0
  • 2
AVERAGE RATING
NUMBER OF RATINGS
8

REVIEWS

  • Tony Watson
    A great introduction

    This is a long tutorial and covers a large range of topics. The instructor speaks with a clear voice and has plenty of screen shares, even if they were a touch unreadable at times. This course is just the tip and if you want to start a career in this area then this is a solid grounding before delving into the real study.

  • 30 day money back guarantee!
  • Lifetime Access. No Limits!
  • Mobile Accessibility
  • Certificate of Completion