Advanced White Hat Hacking & Penetration Testing Tutorial

Learn how to test and protect your network using Ethical Hacking and Penetration Testing Techniques.
  • Lectures 78
  • Video 6 Hours
  • Skill level all level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

Course Description

In this Advanced White Hat Hacking And Penetration Testing training course, Infinite Skills takes you beyond the basics of Ethical Hacking and shows you advanced techniques for discovering potential security problems with your websites and networks. This course requires that you already have familiarity with the basics of penetration testing, and assumes that you have already completed the Learning White Hat Hacking And Penetration Testing course from Infinite Skills.

The course jumps right into the nitty gritty with a chapter about using Dradis. You will learn about scanning, including stealth scanning, data acquisition using various methods, and advanced ways to utilize Metasploit. In this Ethical Hacking tutorial you also learn how to use Burp Suite to do web testing, what reverse engineering is and how to use it, and finally, Ric covers fuzzing with Peach.

Once you have completed this training course on Advanced White Hat Hacking And Penetration Testing, you will have an in-depth understanding of how to test networks and websites for potential exploits for the purpose of securing them. You will also know how to use the tools and software that you will need to perform and analyze this testing.

This White Hat Hacking course follows on from our Beginners White Hat Hacking Course

What are the requirements?

  • PC, Mac Or Linux

What am I going to get from this course?

  • Over 78 lectures and 5 hours of content!
  • Learn How To Test For And Protect Your Network From Hackers
  • Build Robust Networks That Can Withstand Penetration From Unauthorized Access
  • Learn How To Defeat Hackers And Secure Your Hardware From Attack

What is the target audience?

  • Computer Professionals

Curriculum

Section 1: 01. Introduction
0101 What You Should Expect
02:18
0102 What You Should Know
04:49
0103 What You Will Learn
04:04
0104 System Requirements
02:34
HOW TO OBTAIN YOUR CERTIFICATE OF COMPLETION FOR THIS INFINITE SKILLS COURSE.
Text
Section 2: 02. Getting Organized
0201 Ethical Hacking
04:05
0202 Dradis Framework
02:47
0203 Using Notes With Dradis
03:48
0204 Importing Data With Dradis :
03:43
0205 Installing Plugins In Google Chrome
05:04
0206 Installing Plugins In Mozilla Firefox
04:42
0207 Raspberry PI
03:06
0208 SSH Forwarding
05:40
Section 3: 03. Scanning
0301 Refresher On NMAP
02:46
0302 Scan Types
03:20
0303 Stealth Scanning
04:01
0304 Application Scans Using AMAP
03:28
0305 Web Testing With NMAP
04:28
0306 Scanning And Scripting With NMAP And UDP
03:58
0307 Scanning With Hping
03:02
0308 Payload-Based Scanning With Unicorn Scan
02:44
0309 TCP Scanning With Unicorn Scan
04:10
Section 4: 04. Data Acquisition
0401 Using Wappalyzer
03:14
0402 Using Passive Recon
04:55
0403 Using Firebug
05:38
0404 Using Groundspeed
05:22
0405 Converting With Hackbar
02:40
0406 Managing Cookies
04:35
Section 5: 05. Metasploit
0501 Starting Up Metasploit
02:40
0502 Scanning With Metasploit
02:59
0503 Service Scanning With Metasploit
04:58
0504 SMB Scanning With Metasploit
06:23
0505 Importing Nessus Results
05:15
0506 Creating Payloads
05:36
0507 Creating Standalone Exploits
03:18
0508 Encoding And Packing
04:16
0509 Writing Fuzzers Using Metasploit
06:44
0510 Exploits
03:55
0511 Using Meterpreter
03:08
0512 Post-Exploitation
02:52
0513 Pivoting
04:20
0514 Manipulating Windows API
04:06
0515 Client Side Attacks
06:32
0516 Social Engineering Toolkit
02:25
0517 Spear Phishing
03:32
0518 Web Attacks
03:16
0519 Automating Metasploit
03:22
0520 SQL Server Logins
04:52
0521 Token Stealing
02:51
0522 Extending Metasploit
05:12
Section 6: 06. Web Testing
0601 Running Burp Suite
02:15
0602 Passive Scanning
04:34
0603 Active Scanning
04:53
0604 Using The Intruder
02:41
0605 Brute Forcing Passwords
03:33
0606 SQL Injection Testing With Burp Suite
05:59
0607 Cross Site Scripting With Burp Suite
04:57
0608 Using The Burp Suite Repeater
03:07
0609 Using The Burp Suite Sequencer
04:31
0610 XSS-Me
04:13
0611 SQL-Inject Me
03:51
0612 TamperData
03:39
0613 Injection Attacks With TamperData
04:05
0614 Hidden Form Fields
03:09
0615 ZED Attack Proxy
04:09
0616 Fuzzing With ZED Attack Proxy
03:36
0617 Hackbar
02:32
Section 7: 07. Reverse Engineering
0701 Assembly Basics
04:48
0702 Buffer Overflows
04:37
0703 Format String Attacks
03:24
0704 Debugging - Linux
04:43
Section 8: 08. Fuzzing
0801 Peach Fuzzer
02:28
0802 HTTP Fuzzing With Peach
04:55
0803 E-Mail Fuzzing With Peach
05:08
0804 File And Network Fuzzing With Peach
03:32
0805 Sulley
04:44
0806 Spike Proxy
02:52
Section 9: 0901 Extending Your Learning
0901 Extending Your Learning
04:05

Instructor Biography

O'Reilly Media , High Quality Training

O'Reilly spreads the knowledge of innovators through its technology books, online services, magazines, research, and tech conferences. Since 1978, O'Reilly has been a chronicler and catalyst of leading-edge development, homing in on the technology trends that really matter and galvanizing their adoption by amplifying "faint signals" from the alpha geeks who are creating the future. An active participant in the technology community, O'Reilly has a long history of advocacy, meme-making, and evangelism.

Reviews

Average Rating
3.3
Details
  1. 5 Stars
    3
  2. 4 Stars
    2
  3. 3 Stars
    1
  4. 2 Stars
    1
  5. 1 Stars
    2
    • Andy Tyler

    Disappointing

    Having enjoyed the Beginners course (for the most part) I was interested in how this would be 'ramped up' in the Advanced course. Sadly this course would be better described as "Beginners course Part 2". The instructor seemed to be experiencing the tools he was 'demonstrating' for the first time in many cases - making basic mistakes, and often just saying the information that was displayed onscreen. He often repeated himself, as if unsure of what else to say. He also misinterpreted the results of several of the tools (particularly in the Web Testing section). In particular it was almost embarrassing as he attempted to run XSS and SQLi attacks against the DVWA (Damn Vulnerable Web App) while it was in the locked down (High) mode, rather than the (Low or Medium) modes you are supposed to test it in; as well as injecting and fuzzing into the wrong areas of web forms, and also demonstrating TamperData by editing input that didn't have any effect (the XSS attack worked before the tampering...). However it was not all bad - I took away some examples of useful tools and browser extensions which I have since assessed and chosen some of. The demonstrations of Metasploit and nmap were fine for the most part, and I learned a few things from them. As someone who has been doing my own research into InfoSec for the last year or so I wanted this course to provide a good overview, and to give a good grounding in all areas. I suppose it is understandable that an introduction to Assembly and Buffer overflows in 10 minutes wouldn't exactly cover it in much detail! I would suggest a reading list in the final section. In particular I would recommend from my own experiences: *Gray Hat Hacking - The Ethical Hacker's Handbook *Practical Packet Analysis (Wireshark and packets) *Hacking Exposed *Metasploit - The Penetration Tester's Guide *Social Engineering: The Art of Human Hacking *Violent Python (programming your own hacking tools) *Cybersecurity and Cyberwar (Whitepaper for US govt.) Also Troy Hunt's website and guides about Web App security (particularly the OWASP Top Ten) are very accessible and informative.

    • Tony Watson

    A great introduction

    This is a long tutorial and covers a large range of topics. The instructor speaks with a clear voice and has plenty of screen shares, even if they were a touch unreadable at times. This course is just the tip and if you want to start a career in this area then this is a solid grounding before delving into the real study.

What you get with this course

30 day money back guarantee

Lifetime access

Available on desktop, iOS and Android

Certificate of completion

Join the biggest student community

0

Hours of video content

21,000,000

Course enrollment

6,200,000

Students

Ready to start learning?
Preview this course