Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Life Purpose Meditation Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 2 hours on-demand video
  • 4 articles
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Ethical Hacking

Ethical Hacking - Capture the Flag Walkthroughs - v2

Video and lab Walkthroughs for capture the Flag exercises that will strengthen your ethical hacking skills
Rating: 4.5 out of 54.5 (137 ratings)
53,036 students
Created by Prof. K
Last updated 8/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • A much higher skill level as a pentester or a hacker.
  • Be able to pentest any network.
  • Help in preparation for the OSCP exam.
  • Using manual hacks as opposed to automated tools.

Requirements

  • Intermediate expertise with pentesting or hacking.
  • Completion of 'Ethical Hacking Using Hands on Training' or any ethical hacking course is a plus.
  • Comfortable using the Linux command line interface (CLI).
  • Comfortable learning bits of programming code such as Python and PHP.
  • Comfortable creating virtual machines.
  • Hardware and software capable of handling virtualization.
  • Comfortable with the English language.

Description

Welcome to Ethical Hacking - Capture the Flag Walkthroughs v2!

If you're like me, you can't get enough information on pentesting/hacking techniques. We want more, more, more!

This course picks up where v1 left off using all-new capture the flag exercises,  all new step-by-step video tutorials, and hands-on labs. 

You've taken enough ethical hacking courses. You know about the different pentesting tools but you're just not quite sure how to use them in a real-world pentest.  Congratulations! You came to the right course!

Using the hacking methodology, this course will teach you how to use pentesting tools to enumerate and gain root access. Throughout the course, you will learn the different attack vectors used to exploit a target.

You'll learn Python, PHP scripting and tricks of the trade that will astound you!

This is not a course for beginners, bug hunters or wanna-be script kiddies. Anyone enrolling should have a good command of the Linux terminal and be able to follow written step-by-step instructions. Each step of every capture the flag exercise is covered in a video tutorial.

You've taken the ethical hacking courses, you've been introduced to the tools and the methodology. This course brings it all together showing students how to perform an actual pentest and gain root access.

Students step through each of the Capture the Flags (CTF) walkthroughs learning how to footprint a target, enumerate the target for possible vulnerabilities, analyze the vulnerabilities and exploit the target to gain root access. Each CTF demonstrates the advance techniques and different attack vectors used by professional pentesters and hackers. 

Students having completed the Syberoffense Ethical Hacking course can now put to use what they have learned. You've seen the tools, heard all the war stories, now learn to hack like you've been wanting to.

Don't cheat yourself! Check out the free preview of the first module of the course. Students have a lifetime of access and more CTF exercises will be added over time.
 

Who this course is for:

  • Those wanting to see the pentesting tools and hacking methodology being used.
  • This course is not for those new to ethical hacking.
  • Those wanting to be learn advance pentesting/hacking techniques.

Course content

6 sections • 16 lectures • 1h 44m total length

  • Preview04:58

  • Preview13:28

  • Lab - Capture the Flag Walkthrough - Toppo
    00:01
  • Video Tutorial #1 - Lab Preparation
    04:20
  • Video Tutorial # 2 - Recon, Enumeration, gaining access, post exploitation
    11:21

  • Lab - Capture the Flag Walkthrough – Lampiao
    00:01
  • Video Tutorial #1 - Lab Preparation
    06:14
  • Video Tutorial # 2 - Recon, Enumeration, Gaining access
    13:52
  • Video Tutorial #3 - Exploitation, Privilege Elevation
    12:43

  • Lab - Capture the Flag Walkthrough – DC-1
    00:01
  • Video Tutorial #1 - Lab Preparation
    02:21
  • Video Tutorial # 2 - Recon, Enumeration, Gaining access
    07:56
  • Video Tutorial #3 - Exploitation, Privilege Elevation
    06:37

  • Lab - CTF Walkthrough – SickOS 1.1
    00:01
  • Video Tutorial #1 - Lab Preparation
    04:35
  • Video Tutorial # 2 - Recon, Enumeration, gaining access, post exploitation
    16:08

Instructor

Prof. K
Technology Professional, Online Instructor
Prof. K
  • 4.5 Instructor Rating
  • 3,769 Reviews
  • 207,968 Students
  • 13 Courses

Prof. K comes to Udemy with a Master of Science in Cyber Security from UMUC (2015) and Master of Science in Information Technology from Capella University (2007).

Prof. k has worked in technology since 1998 working as a Microsoft Support Technician, a Microsoft Certified Trainer, Technology support specialist, a Senior Network Technology Consultant, an IT Auditor and most recently as the owner and operator of his own technology firm, CLK Technology Solutions located in Tucson Arizona. Professor K's expertise in technology focuses on designing, building, supporting network infrastructures and network security.

Professor K has taught online since 2008 and teaches for a number of other online universities and colleges. 

Prof. k holds a number of valid technology certifications including:

• MCTS: Windows Server 2008 Active Directory, Configuration
• MCTS: Windows Server 2008 Applications Infrastructure, Configuration
• MCTS: Windows Server 2008 Network Infrastructure, Configuration
• A+, Net+, Security+

Professor K spends his spare time working in his wood shop and providing free technical support to the local retirement community in Tucson Arizona.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.