Be A White Hat Hacker and Pen Tester

Master Practical White Hat Hacking Techniques and Pen Testing
3.2 (54 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
3,767 students enrolled
$30
Take This Course
  • Lectures 24
  • Contents Video: 4.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2015 English

Course Description

Become a white hat hacker and learn all the practical techniques for penetration testing with this amazing course which will provide conceptual framework to your security training. The course not only covers theoretical concepts but cover the practical demonstrations of various tools like Metaspoilt, Scapy and WireShark.

The course is divided into the following main sections:

Ethical Hacking Concepts

-What is Ethical Hacking? Know about different types of hackers. Get to know about hacktivism and practical pen testing techniques

Real World Information Gathering

-Learn about foot printing and reconnaissance, Email harvesting, Learn and master SSL scan, Maltego, Whatweb, HttpRecon. Work on techniques like IP address geolocation, DNS and Mail Server Enumeration

Scanning and Vulnerability Gathering

-Learn to use scapy for packet crafting and port scanning, Learn to use network scanning techniques and work on vulnerability identification

Network Attacking Techniques

Master techniques for password cracking, MITM, Sniffing SSL and RDP attacks

Web Exploitation Techniques

Learn about password attacks, SQL Injections, RCE and DOS attacks

Wireless Network Security

Standards in Wireless security, WEP encryption, Wireless sniffing, Protecting Wireless networks

Metaspoilt

Learn to use the metaspoilt tool for your projects

Detection Evasion

Learn about the detection evasion techniques

This exhaustive course covers everything you need to know about white hat hacking. Get the Knowledge, Get the Expertise.

What are the requirements?

  • Students should have some background in testing and knowledge of web servers, networks and web technologies

What am I going to get from this course?

  • Master Ethical Hacking
  • Apply concepts learnt to ethically hack Systems and Networks
  • Understand Security Paradigms and will be able to create more secure systems and software
  • Act as a security and Pen testing consultant

What is the target audience?

  • Students who want to be system security professionals
  • Students who want to learn Ethical Hacking

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction To Ethical Hacking
06:29

Introduction to the Ethical Hacking Course

Section 2: Introduction to Ethical hacking and Penetration testing
12:28

The lecture explains the basic concepts behind Pen testing and Ethical Hacking

Section 3: Real World information gathering
16:57

The Lecture covers topics such as foot printing reconnaissance, harvesting company emails and maltego

07:31

Learn to use Maltego.

12:26

Learn all about search engines and concepts such as SSL scan, whatweb and ip address geolocation

08:39

This Lecture cover concepts such as DNS enumeration and Mail server enumeration

Section 4: Scanning and Vulnerability gathering
10:31

Learn to use Scapy for vulnerability accessment

10:58

Learn all about vulnerability Identification and assesment

16:03

Learn practical avoidance techniques and concepts

Section 5: Network attacking techniques
12:29

Learn the major network attacking techniques

13:15

A practical demo for wifi hack

Section 6: Desktop Hacking Techniques
10:51

Learn all about the desktop hacking techniques

12:42

Learn the concepts behind Linux and Windows Hacking

Section 7: Web Exploitation Techniques
Web Exploitation - Basic Techniques
09:25
Web Testing Tools
10:35
Exploiting and Counter Measures
10:01
Section 8: Wireless network Security
12:44

Learn all about wireless networks, standards and wifi security threads

Wireless network Security - Breaking WEP Encryption
10:51
11:14

Learn to do wireless sniffing with wire shark

Section 9: Metasploit
07:43

Introduction to Metaspoilt

09:31

Lecture describes the advance Metaspoilt features

06:55

Learn the practical techniques to use Metaspoilt

Section 10: Detection Evasion
08:53

Learn detection evasion techniques such as encryption and Obfuscation

Section 11: Summary
06:42

Course Summary

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Eduonix creates and distributes high quality technology training content. Our team of industry professionals have been training manpower for more than a decade. We aim to teach technology the way it is used in industry and professional world. We have professional team of trainers for technologies ranging from Mobility, Web to Enterprise and Database and Server Administration.

Instructor Biography

Ready to start learning?
Take This Course