Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Meditation Life Purpose Personal Transformation Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

Advanced White Hat Hacking & Penetration Testing Tutorial

Learn how to test and protect your network using Ethical Hacking and Penetration Testing Techniques.
Rating: 3.9 out of 53.9 (123 ratings)
7,530 students
Created by Infinite Skills
Last updated 6/2013
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Learn How To Test For And Protect Your Network From Hackers
  • Build Robust Networks That Can Withstand Penetration From Unauthorized Access
  • Learn How To Defeat Hackers And Secure Your Hardware From Attack

Requirements

  • PC, Mac Or Linux

Description

In this Advanced White Hat Hacking And Penetration Testing training course, Infinite Skills takes you beyond the basics of Ethical Hacking and shows you advanced techniques for discovering potential security problems with your websites and networks. This course requires that you already have familiarity with the basics of penetration testing, and assumes that you have already completed the Learning White Hat Hacking And Penetration Testing course from Infinite Skills.

The course jumps right into the nitty gritty with a chapter about using Dradis. You will learn about scanning, including stealth scanning, data acquisition using various methods, and advanced ways to utilize Metasploit. In this Ethical Hacking tutorial you also learn how to use Burp Suite to do web testing, what reverse engineering is and how to use it, and finally, Ric covers fuzzing with Peach.

Once you have completed this training course on Advanced White Hat Hacking And Penetration Testing, you will have an in-depth understanding of how to test networks and websites for potential exploits for the purpose of securing them. You will also know how to use the tools and software that you will need to perform and analyze this testing.

This White Hat Hacking course follows on from our Beginners White Hat Hacking Course

Who this course is for:

  • Computer Professionals

Course content

9 sections • 77 lectures • 5h 8m total length

  • Preview02:18
  • Preview04:49
  • Preview04:04
  • 0104 System Requirements
    02:34

  • 0201 Ethical Hacking
    04:05
  • 0202 Dradis Framework
    02:47
  • 0203 Using Notes With Dradis
    03:48
  • 0204 Importing Data With Dradis :
    03:43
  • 0205 Installing Plugins In Google Chrome
    05:04
  • 0206 Installing Plugins In Mozilla Firefox
    04:42
  • 0207 Raspberry PI
    03:06
  • 0208 SSH Forwarding
    05:40

  • 0301 Refresher On NMAP
    02:46
  • 0302 Scan Types
    03:20
  • 0303 Stealth Scanning
    04:01
  • 0304 Application Scans Using AMAP
    03:28
  • 0305 Web Testing With NMAP
    04:28
  • 0306 Scanning And Scripting With NMAP And UDP
    03:58
  • 0307 Scanning With Hping
    03:02
  • 0308 Payload-Based Scanning With Unicorn Scan
    02:44
  • 0309 TCP Scanning With Unicorn Scan
    04:10

  • 0401 Using Wappalyzer
    03:14
  • 0402 Using Passive Recon
    04:55
  • 0403 Using Firebug
    05:38
  • 0404 Using Groundspeed
    05:22
  • 0405 Converting With Hackbar
    02:40
  • 0406 Managing Cookies
    04:35

  • 0501 Starting Up Metasploit
    02:40
  • 0502 Scanning With Metasploit
    02:59
  • 0503 Service Scanning With Metasploit
    04:58
  • 0504 SMB Scanning With Metasploit
    06:23
  • 0505 Importing Nessus Results
    05:15
  • 0506 Creating Payloads
    05:36
  • 0507 Creating Standalone Exploits
    03:18
  • 0508 Encoding And Packing
    04:16
  • 0509 Writing Fuzzers Using Metasploit
    06:44
  • 0510 Exploits
    03:55
  • 0511 Using Meterpreter
    03:08
  • 0512 Post-Exploitation
    02:52
  • 0513 Pivoting
    04:20
  • 0514 Manipulating Windows API
    04:06
  • 0515 Client Side Attacks
    06:32
  • 0516 Social Engineering Toolkit
    02:25
  • 0517 Spear Phishing
    03:32
  • 0518 Web Attacks
    03:16
  • 0519 Automating Metasploit
    03:22
  • 0520 SQL Server Logins
    04:52
  • 0521 Token Stealing
    02:51
  • 0522 Extending Metasploit
    05:12

  • 0601 Running Burp Suite
    02:15
  • 0602 Passive Scanning
    04:34
  • 0603 Active Scanning
    04:53
  • 0604 Using The Intruder
    02:41
  • 0605 Brute Forcing Passwords
    03:33
  • 0606 SQL Injection Testing With Burp Suite
    05:59
  • 0607 Cross Site Scripting With Burp Suite
    04:57
  • 0608 Using The Burp Suite Repeater
    03:07
  • 0609 Using The Burp Suite Sequencer
    04:31
  • 0610 XSS-Me
    04:13
  • 0611 SQL-Inject Me
    03:51
  • 0612 TamperData
    03:39
  • 0613 Injection Attacks With TamperData
    04:05
  • 0614 Hidden Form Fields
    03:09
  • 0615 ZED Attack Proxy
    04:09
  • 0616 Fuzzing With ZED Attack Proxy
    03:36
  • 0617 Hackbar
    02:32

  • 0701 Assembly Basics
    04:48
  • 0702 Buffer Overflows
    04:37
  • 0703 Format String Attacks
    03:24
  • 0704 Debugging - Linux
    04:43

  • 0801 Peach Fuzzer
    02:28
  • 0802 HTTP Fuzzing With Peach
    04:55
  • 0803 E-Mail Fuzzing With Peach
    05:08
  • 0804 File And Network Fuzzing With Peach
    03:32
  • 0805 Sulley
    04:44
  • 0806 Spike Proxy
    02:52

  • 0901 Extending Your Learning
    04:05

Instructor

Infinite Skills
High Quality Training
Infinite Skills
  • 4.3 Instructor Rating
  • 117,331 Reviews
  • 1,231,160 Students
  • 327 Courses

Infinite Skills is a Canadian based company who offer a huge and ever growing range of high quality eLearning solutions that teach using studio quality narrated videos backed-up with practical hands-on examples and comprehensive working files. All courses are created by trained educators and experts in video based education.

The emphasis is on teaching real life skills that are essential for progressing in today's commercial environment.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.