Advanced Ethical Hacking
4.6 (6 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
132 students enrolled

Advanced Ethical Hacking

In-depth course which covers the tools and techniques for performing penetration testing.
4.6 (6 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
132 students enrolled
Last updated 9/2013
English
English [Auto-generated]
Price: $39.99
30-Day Money-Back Guarantee
This course includes
  • 6.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Learn tools and techniques for performing ethical hacking (also known as penetration testing).
Requirements
  • n/a
Description

This Advanced Ethical Hacking course from VTC will provide direction on tools and techniques for performing ethical hacking (also known as penetration testing). Author Ric Messier will cover Nessus, Nexpose, Nmap, and Metasploit, as well as manual testing techniques. He will also demonstrate Web Application Testing and various tools that will assist in that effort. This title is a self-paced software training course delivered via pre-recorded video. We do not provide additional information outside of the posted content.

Who this course is for:
  • Computer and Network Experts
Course content
Expand all 100 lectures 06:19:37
+ Nessus
10 lectures 40:13
Acquiring Nessus
02:22
Setting Up Nessus
04:02
Configuring Nessus
04:29
Scan Details: Network
04:12
Scan Details: Credentials / Plugins / Options
04:25
Scan Details: Web Applications
05:54
Starting a Scan
03:45
Reviewing Results
04:49
False Positives
03:27
Setting Up Jobs
02:48
+ Nexpose
5 lectures 16:33
Acquiring Nexpose
03:02
Setting Up Nexpose
02:13
Configuring Nexpose
04:21
Adding Hosts to Nexpose
03:28
Reviewing Results & Manual Checks
03:29
+ Manual Testing
6 lectures 30:37
Netcat
04:22
Protocol Checking
07:52
SSL_Client
04:48
SSLScan
04:36
Nikto
04:59
Snmpwalk
04:00
+ Metasploit
16 lectures 56:13
Acquiring Metasploit
02:32
Setting Up Metasploit
02:01
Metasploit Web Interface
03:26
Configuring Workspaces
02:44
Running Nmap from Metasploit
03:34
Importing Nessus Results
02:43
Scanning with Metasploit
03:51
Looking at Vulnerabilities
02:48
Searching for Vulnerabilities
02:09
Running Exploits
02:33
Post Exploitation Data Gathering
04:08
Pivoting & Tunneling
03:18
Writing an MSF Plugin
06:11
Writing Fuzzers
06:17
Social Engineering Toolkit
02:05
Spear Phishing
05:53
+ Simple Web Application Testing
12 lectures 48:26
Browser Plugins with Chrome
04:20
Browser Plugins with Firefox
03:49
Tamperdata
04:36
Performing Injections with Tamperdata
02:42
Cookie Data with Tamperdata
05:54
SQL Inject Me
03:25
XSS Me
03:25
Firebug
04:30
Hackbar
04:00
Wappalyzer
03:47
Passiverecon
04:05
Groundspeed
03:53
+ Webgoat
4 lectures 12:54
Acquiring Webgoat
02:50
Practicing Web Application Attacks
02:33
Basics of Webgoat
03:04
Working Through Lessons
04:27
+ Burpsuite
11 lectures 45:00
Acquiring Burpsuite
01:32
Installing Burpsuite
01:57
Running Burpsuite & Configuring Your Browser
02:48
Spidering
03:15
Passive Scanning
03:09
Active Scanning
03:19
Investigating Results
06:32
Password Attacks
05:19
Fuzzing Attacks
06:40
Doing Sequencing
04:34
Using the Intruder
05:55