Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS AWS Certified Developer - Associate CompTIA Security+
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Neuroscience Coaching
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Google Analytics
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 7.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Ethical Hacking

Network Penetration Testing (Ethical Hacking) From Scratch

Learn ethical hacking from scratch from a networking based perspective
Rating: 4.1 out of 54.1 (209 ratings)
1,489 students
Created by TWR Internet Solutions Ltd
Last updated 5/2017
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Conduct a basic network penetration test from start to finish from an ethical hackers perspective
  • Better understand the world of penetration testing
  • Gain prerequisites to doing certified courses such as CISSP, OSCP (PWK) and CEH

Requirements

  • A basic understanding of networking
  • Be able to understand the basics of using Linux based operating systems

Description

This course aims to teach student's how to become an ethical hacker/penetration tester from a networking perspective from scratch, therefore prior knowledge of the fundamentals of networking and basic Linux commands would be beneficial but not essential. The course covers the entire process of network based ethical hacking from a professional penetration testers point of view. 

The introductory areas cover the ethics and jurisdictional points surrounding penetration testing a client network. The next sections include integral passive and active information gathering functions when conducting a client engagement. 

The course then looks into the various exploitation techniques a hacker would use and accompanies detailed demonstrations of how to find and exploit such issues. Once exploited, the course then looks at post exploitation methods. This includes ways in which an attacker can further exploit the client to gain access to other areas of the network as well as maintain access once exploited.

Finally the course focuses on additional techniques an ethical hacker would take once they have already gained control of a client network and therefore use perspectives such as networking tools similar to Wireshark or TCPDump. In addition other entry points would include hardware tools that can be used for exploitation such as WiFi related hacking, which is only covered from a theoretical point of view within this course. 

This course is perfect for anyone who is looking for a primer for more expensive ethical hacking certifications such as OSCP, CEH, and the technical element of CISSP.

Who this course is for:

  • Beginner level students who are interested in the world of ethical hacking and penetration testing

Featured review

Lloyd Wright
Lloyd Wright
41 courses
25 reviews
Rating: 5.0 out of 5a year ago
10 out of 10...great information and easily laid out to help an inspiring pen tester in establishing industry practices in manageable sections, would recommend to all those starting out to give this course a go.

Course content

9 sections • 70 lectures • 7h 20m total length

  • Preview06:41
  • Preview06:37
  • Reporting For a Client
    08:46
  • Glossary of Terms - Part 1
    07:13
  • Glossary of Terms - Part 2
    07:23

  • Preview05:44
  • Legal Considerations Part 2
    05:17

  • Preview07:30
  • Setting Up Kali- Part 1
    07:03
  • Setting Up Kali- Part 2
    07:49
  • Setting Up Ethical Hacking Tools In Mac OS - Part 1
    04:51
  • Setting Up Ethical Hacking Tools In Mac OS - Part 2
    05:57
  • Vulnhub and Metasploitable 2
    07:35
  • Cloud Services Part 1
    06:21
  • Cloud Services Part 2
    05:05
  • Taking Notes For Client Engagements
    06:14
  • FTP and SFTP
    06:38
  • Running an Apache Web Server and Passing Files Between a Client and Attacker
    05:40

  • Preview05:14
  • Passive Information Gathering - Part 2
    05:18
  • Searching For Personnel During a Client Engagement
    03:47

  • Cewl - Collecting Information From a Client Website
    04:01
  • Preview06:52
  • Nmap - Using The Scripting Engine
    08:05
  • Nikto - Searching for Web Based Vulnerabilities
    08:34
  • Openvas - Scanning For Network/Website Related Vulnerabilities
    08:25
  • Dirb/Dirbuster - Brute Forcing Web Directories
    08:15
  • Metasploit - Using the Scanning Based Modules - Part 1
    05:41
  • Metasploit - Using the Scanning Based Modules - Part 2
    04:18
  • Ncat - Banner Grabbing - Part 1
    04:29
  • Ncat - Banner Grabbing - Part 2
    04:56
  • DNS Enumeration - Part 1
    05:23
  • DNS Enumeration - Part 2
    05:26
  • SMB Enumeration
    07:31

  • Preview05:40
  • Metasploit - Exploit
    07:54
  • Metasploit - Payload
    06:06
  • MSFvenom - Creating a custom payload
    06:55
  • Burpsuite - Web Proxy
    08:37
  • Zap - Web Proxy
    07:06
  • SQL Injection - How to
    07:46
  • SQL Injection - NoSQL How to
    05:08
  • Pret - Exploiting Printers
    06:54
  • LFI & RFI - Local File Inclusion & Remote File Inclusion
    05:47
  • Veil - Evading Anti Virus - Part 1
    04:04
  • Veil - Evading Anti Virus - Part 2
    06:06
  • Using a Reverse Shell - Part 1
    04:45
  • Using a Reverse Shell - Part 2
    04:46
  • Patator - Password Attacks - Part 1
    07:37
  • Patator - Password Attacks - Part 2
    04:38
  • BOF - What is a Buffer Overflow
    05:20
  • BOF - Buffer Overflow Demo - Part 1
    07:39
  • BOF - Buffer Overflow Demo - Part 2
    07:24
  • BOF - Buffer Overflow Demo - Part 3
    05:08

  • Phishing
    08:30

  • Preview06:40
  • Windows Machine - Part 2
    04:55
  • Linux Machine Part 1
    06:20
  • Linux Machine Part 2
    04:21
  • Mimikatz - Extracting Hashes From Memory
    08:35
  • FGdump - Extracting Password Hashes
    06:37
  • Cracking Hashes
    06:44
  • Pivoting - Part 1
    07:14
  • Pivoting - Part 2
    05:19
  • Persistance - Maintaining Access to a Client Machine
    09:07

  • Wireshark - Part 1
    05:26
  • Wireshark - Part 2
    05:58
  • TCPDump
    04:59
  • Preview06:03
  • Hardware - Part 2
    03:44

Instructor

TWR Internet Solutions Ltd
Providing high quality, affordable material
TWR Internet Solutions Ltd
  • 4.1 Instructor Rating
  • 1,453 Reviews
  • 59,915 Students
  • 5 Courses

TWR Internet Solutions Ltd was formed as part of a collaboration of experts specialising in networking, forensics, programming and ethical hacking. The team each have over ten years experience in their specific fields, the company belief is to provide affordable training of a high standard to help aid people from all backgrounds in getting into specialist fields of computing.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.