Real world Hacking & Penetration testing: Version-1
4.5 (646 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
31,508 students enrolled

Real world Hacking & Penetration testing: Version-1

Professional Level Ethical Hacking & Penetration testing from Beginner to Advanced - From Real World Experience!
4.5 (646 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
31,508 students enrolled
Created by Atul Tiwari
Last updated 8/2018
English [Auto]
Current price: $135.99 Original price: $194.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 5.5 hours on-demand video
  • 3 articles
  • 7 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Perform penetration testing computers, networks, wireless, web apps and secure computers and networks by exposing vulnerabilities and patching them.
  • Discover and exploit what a modern penetration tester does.
  • Penetrate and Exploit even highly secured environments
  • Effectively execute modern attack techniques
  • Use commercial / open-source penetration testing tools to efficiently assess traditional and non-traditional networks
  • Do not need to code, Hack from real world tools, scripts on your own.
  • Develop strategies for communicating risk that impacts an organization's security posture
  • Ethical hacking and penetration testing
  • Cyber security tools and techniques
  • Basic computing knowledge with internet and networking.
  • keen interests to equip yourself with latest hacking tools and tricks.
  • First thing first - This course is updated every 3 months with new lessons, new updates, new tricks and tips!

If you are wanting to learn Ethical Hacking and Penetration Testing to a Professional Standard, and work online to help companies secure their data, you will love this Udemy Course!

In this highly practical course, you will learn from a Certified Professional Hacker & Penetration tester. You will get practical details about what a modern pen-tester must have in order to be a professional level Penetration Tester.

This course covers, Computer Attacks, Networks Attacks, Web Applications Penetration Testing and Security, Exploits, VAPT, Automated Attacks, Firewall & AV Evasion, Veil-Evasion, DARKNET, Wireless attacks, Social-Engineering attacks, Best Commercial Tools and my tips at professional level from real world examples of  penetration testing. 

This course has been designed so students from non-technical background can learn with ease and use these skills to be a good Penetration Tester.

The course has been developed by myself after several research and development projects. This 100% practical course is for anyone wanting to be a competent Information Security Professional and Penetration Tester.

All the modules are independent, so you can start any module you want, but I recommend to learn the course in chronological order.

If for what ever reason, this course does not meet with your expectations, you will have Udemy's 30 days 'no questions asked' money back guarantee!

** Don't Delay, every second could be costing you money, and professional skills! ***

Who this course is for:
  • People willing to acquire deep understanding of thoroughly Professional Penetration testing.
  • Ethical hackers
  • Penetration testers
  • Web application security
  • Cyber enthusiasts
  • Security admin
  • Network security
Course content
Expand all 57 lectures 05:43:26
+ Introduction to penetration testing and ethical hacking
3 lectures 17:35

Taking a hands-on approach to identify technologies running at server side

Preview 02:45

HTTP and HTTPS insights in detailed to make web application security testing further

HTTP Protocol basics
+ Building your penetration testing Box (LAB)
4 lectures 11:26
Setting-up OWASPbwa VM
Setting-up KALI LINUX vm
Setting-up metasploitable
Setting-up Windows VM
+ Penetration Testing methodologies
1 lecture 02:25
Penetration Testing methodologies
+ Passive Discovery - Open Source Intelligence gathering
5 lectures 57:22
Open source intelligence gathering - Basics
Open source intelligence gathering - Recon-ng
Open source intelligence gathering - DiscoverScript
Open-source intelligence gathering - Spiderfoot
Recon-ng - Complete info data - Refined
+ Active Discovery - Reconnaissance
3 lectures 21:20
Active Reconnaissance with Sparta
Scanning Entire network in 6 minutes
Taking massive snapshot of web
+ Vulnerability Assessments
7 lectures 54:56
Vulnerability Assessment - Nessus
Vulnerability Assessment - OpenVAS
Vulnerability Assessment - Nikto
Quick findings of web apps vulnerabilities
ZAP scan analysis
Web application scanning - AppSpider_pro
+ Vulnerability to Exploitation - Exploiting the targets
5 lectures 43:31
Metasploit Commanding
Metasploit - Exploiting MS08-067
Metasploit - Exploiting web apps
Binary Exploitation - Buffer overflow attack
Browser Exploitation with BeEF
+ Web application Penetration testing - Exploitation
4 lectures 28:07
Exploiting SQL Injection
Cross Site Scripting attacks - XSS
Cross Site Request Forgery attack - CSRF
Fuzzing Input fields
+ Wireless Network Hacking
1 lecture 06:48
WPA/WPA2 Cracking ( wireless security testing )
+ Post Exploitation attacks - Lateral Moving in Networks
5 lectures 19:14
First post Responder
Adding user account to target machine
Creating persistent backdoor on target machine
Dumping cached credentials ( last 10 passwords )