Complete Ethical Hacking Series: Pen Testing the Right Way
4.0 (14 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,849 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Complete Ethical Hacking Series: Pen Testing the Right Way to your Wishlist.

Add to Wishlist

Complete Ethical Hacking Series: Pen Testing the Right Way

Complete Ethical Hacking Series (CEHv9): Pen Testing the Right Way
4.0 (14 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,849 students enrolled
Created by Chad Russell
Last updated 9/2017
English
English [Auto-generated]
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1.5 hours on-demand video
  • 1 Article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • You will learn how to pen test applications, databases, conduct vulnerability scans, attack Macs and leverage advanced techniques such as buffer overflows using tools such as Metasploit.
View Curriculum
Requirements
  • Students should have a working understanding of TCP/IP and networking concepts.
Description

Complete Ethical Hacking Series:  Pen Testing the Right Way

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures!    Each chapter closes with exercises putting your new learned skills into practical use immediately.   You will start by understand network anonymity by using tools such as Tor, Tortilla and Proxy Chains. 

What are the pre-requisites for this course?

  1. Students should have a working understanding of TCP/IP and networking concepts. 

What will you be able to do after taking this course?

  • Penetration Testing - penetration test, colloquially known as a pen test, is an authorized simulated attack on a computer system that looks for security weaknesses, potentially gaining access to the system's features and data.


  • Exploit Design Flaws and Bugs - software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.


  • Firebug - Firebug integrates with Firefox to put a wealth of development tools at your fingertips while you browse.


  • OpenVAS Vulnerability Scanner - OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution.


  • GFI LanGuard - GFI LanGuard network vulnerability scanner and patch management software performs over 60000 vulnerability assessments to discover threats early.


  • XSS and Injection Techniques - Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
  • View Source Chart Tool - Enables accelerated human processing of DOM. 2. Displays more structure/ sequence information within the current view port.
  • Using Perl and C to Automate Hacks - Perl is a family of high level, general purpose programming languages. The languages in this family include Perl 5 and Perl 6.  


Who is the target audience?
  • This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately.
Compare to Other Penetration Testing Courses
Curriculum For This Course
13 Lectures
01:23:15
+
Complete Ethical Hacking Series (CEHv9) : Pen Testing the Right Way
13 Lectures 01:23:37
  • Penetration Testing - penetration test, colloquially known as a pen test, is an authorized simulated attack on a computer system that looks for security weaknesses, potentially gaining access to the system's features and data.
Preview 09:25

  • OpenVAS Vulnerability Scanner - OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution.
Preview 01:30

  • GFI LanGuard - GFI LanGuard network vulnerability scanner and patch management software performs over 60000 vulnerability assessments to discover threats early.
Vulnerability Scanning with GFI LanGuard
01:51

Design Flaws and Bugs
04:31

Firebug
04:51

View Source Chart
04:17

  • Security Testing Tools - Learn about the testing tool landscape and how these tools can be used to automate the pen testing process. 
Security Testing Tools
10:01

  • Fragroute Attack - Learn how to stealthily hack systems protected by IDS using fragroute.  
Fragroute Attacks
04:04

  • XSS and Injection Techniques - Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
XSS and Injection Techniques
09:10

  • Persistent XSS (or Stored XSS) attack is one of the three major categories of XSS attacks, the others being Non-Persistent (or Reflected) XSS and DOM-based XSS. In general, XSS attacks are based on the victim's trust in a legitimate, but vulnerable, website or web application.
Persistent XSS Attack Example
01:53

Perl is a family of high level, general purpose programming languages. The languages in this family include Perl 5 and Perl 6.  

Hacking with Perl
06:06

  • Many exploits are written in C.   It is important to know C in order to modify and write exploit code.  
Hacking with C
25:32

Bonus Section
00:26
About the Instructor
Chad Russell
3.8 Average rating
1,125 Reviews
23,007 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!