The Complete Penetration Testing Bootcamp
4.3 (647 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
14,257 students enrolled

The Complete Penetration Testing Bootcamp

Learn Penetration Testing The Right Way! Learn All The Ethical Hacking & Penetration Testing Techniques Used By Hackers
4.3 (647 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
14,257 students enrolled
Last updated 10/2018
English
English [Auto-generated]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 10.5 hours on-demand video
  • 5 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Setup your own virtual penetration testing lab
  • Completely anonymize your online and hacking activity
  • Setup a VPN with Kali Linux
  • Setup Proxychains and a VPN for maximum anonymity and minimum DNS leaks
  • Use the Linux terminal for Ethical Hacking
  • Setup Terminal alternatives to boost productivity
  • Understand the networking fundamentals behind ethical hacking and penetration testing
  • Understand the OSI layer
  • Understand the 3 way TCP handshake
  • Grasp the usaage of Nmap for information gathering
  • Understand the Nmap syntax for a variety of scans
  • Use Nmap for advanced discovery
  • Use Nmap for advanced information gathering
  • Understand the Metasploit syntax for ethical hacking
  • Understand the Metasploit terminology used for penetration testing and ethical hacking
  • Perform exploitation with Metasploit
  • Install the Metasploit community Web GUI edition
  • Web server hacking with Metasploit
  • FTP Backdoor exploitation
  • Using Nikto Web vulnerability scanner
  • Wordpress hacking
  • Using WPScan
  • Password cracking with John The Ripper
  • BeEF browser exploitation
  • Bruteforce attacks
  • Arimtage
  • Using Veil Evasion
  • Generating Wordlists
  • Using Netcat
  • Arp spoofing
  • Arp poisoning
  • WPA/WPA2 cracking with aircrack-ng
  • WPA/WPA2 cracking with airgeddon
  • DDoS Attacks
  • Network sniffing with Wireshark
  • Meterpreter
  • Generating backdoors
  • Using RAT's
Requirements
  • This Course Requires A Computer And An Internet Connection.
  • No prior experience or knowledge of Ethical Hacking is required. The course will take you through everything you need to know about Ethical Hacking & Penetration Testing
  • Basic Knowledge of Kali Linux
  • Basic Knowledge of Linux
Description

This course is a support package for the HackerSploit YouTube channel,  some of the content found in this course is free on YouTube, we have added some private videos here to justify it's existence. If you want to support HackerSploit, consider purchasing the course.

The Complete Penetration Testing Course Is The Most Comprehensive And Extensive Course On Ethical Hacking & Penetration Testing With Aim Of Taking you from beginner to advanced.

This course covers every aspect of Ethical Hacking and Penetration Testing from information gathering with tools like Nmap to exploitation and privilege escalation with Metasploit.

Curious about Ethical Hacking?

Want to learn Ethical Hacking the right way?

Want  to learn Ethical Hacking from beginner to advanced?

Want to learn how to setup a virtual penetration testing environment?

Want to learn how to setup proxychains and VPN's for maximum anonymity?

Want to learn how to use Linux for Ethical Hacking?

Want to learn how the Networking fundamentals of Ethical Hacking?

Want to learn information gathering with Nmap?

Want to learn how to use Metasploit for penetration testing and Ethical Hacking?

Want to learn Web server hacking?

Want to learn advanced client side and server side exploitation?

Want to learn how to attack wired and wireless networks (WPA/WPA2)?

Want to learn how to perform network sniffing with Wireshark?

Want to learn post exploitation and privilege escalation?

Whatever you want to learn about Ethical Hacking and penetration testing. This Course Has Everything You Will Ever Need To Know About Ethical Hacking.

This Course Has Everything From Basic Terminology, Setting Up A Secure And Safe Environment to advanced exploitation with frameworks like Metasploit.

This course will show you the best frameworks and techniques used in Ethical Hacking.

This course will ensure that you grasp and understand the techniques used in Ethical Hacking

This course is targeted at anyone who wants to get started with Ethical Hacking. Even if you are a complete beginner, or someone who has a little experience. You are in the right place.

Who this course is for:
  • Anyone interested in learning Ethical Hacking or Penetration Testing
  • Anyone interested in Cyber Security
  • Anyone wanting to learn Metasploit
  • Anyone interested in becoming an Ethical Hacker
Course content
Expand all 65 lectures 10:35:22
+ Introduction
1 lecture 05:44

Welcome to the Ethical Hacking Masterclass

Preview 05:44
+ Setting Up Your Environment
4 lectures 59:27

In this lecture we are going to be looking at how to setup a virtual penetration testing lab for ethical hacking

Preview 28:53

In this lecture we are going to be looking at how to setup a virtual penetration testing lab for ethical hacking. We will be installing metasploitable2 

Downloading and installing Metasploitable2
08:34

In this lecture we are going to be looking at how to setup a virtual penetration testing lab for ethical hacking. We will be installing VMware

Installing VMware
03:41

In this lecture we are going to be looking at how to setup a virtual penetration testing lab for ethical hacking

How To Install Kali Linux On VMware
18:19
+ Anonymity
4 lectures 38:02
How To Setup Proxychains On Kali Linux
08:10

In this lecture we are going to be looking at how to stay anonymous while performing penetration testing and ethical hacking

How to setup Anonsurf on Kali Linux
09:55

In this lecture we are going to be looking at how to stay anonymous while performing penetration testing and ethical hacking

Preview 07:43

In this lecture we are going to be looking at how to stay anonymous while performing penetration testing and ethical hacking

The Complete DNS guide - How to change your DNS
12:14
+ Getting started with Linux
5 lectures 49:27
Adding Users & Changing Passwords
08:03
System Services
07:58
The Aptitude Package Manager - Installing & Updating packages
07:46
Linux File System
21:03

In this lecture we are going to be looking at how to use the linux terminal for penetration testing and ethical hacking

Installing Terminator - Terminal Emulator & Multiplexer
04:37
+ Networking Fundamentals
4 lectures 17:58

In this lecture we are going to be looking at the networking fundamentals for penetration testing and ethical hacking

Preview 02:32

In this lecture we are going to be looking at the networking fundamentals for penetration testing and ethical hacking

The Network Layer
04:38

In this lecture we are going to be looking at the networking fundamentals for penetration testing and ethical hacking

The Transport Layer
05:59

In this lecture we are going to be looking at the networking fundamentals for penetration testing and ethical hacking

The TCP 3 Way Handshake
04:49
+ Passive Information Gathering
4 lectures 26:10

In this lecture we will be looking at how to perform whois lookup and DNS reconnaissance

Information Gathering - Whois Lookup & DNS Reconnaisance
07:24

In this lecture we will be looking at how to gather emails with heharvester

Gathering Emails - theharvester
07:02

In this lecture we will be looking at how to perform whois lookup with kali linux 

Whois Lookup
04:23
Netcraft - Passive Information Gathering
07:21
+ Active Information Gathering
17 lectures 01:27:27
DNS Enumeration
05:26
DNSRecon
04:21

In this lecture we are going to be looking at how to use Nmap for ethical hacking

Preview 07:21

In this lecture we are going to be looking at how to use Nmap for ethical hacking

Installing Nmap on Linux
04:33

In this lecture we are going to be looking at how to use Nmap for ethical hacking

Installing Zenmap on Linux
03:49

In this lecture we are going to be looking at how to use Nmap for ethical hacking

Scanning a single target
05:18

In this lecture we are going to be looking at how to use Nmap for ethical hacking

Scanning multiple targets
05:20

In this lecture we are going to be looking at how to use Nmap for ethical hacking

Scanning an IP range
07:07

In this lecture we are going to be looking at how to use Nmap for ethical hacking

Scanning an entire subnet
03:37

In this lecture we are going to be looking at how to use Nmap for ethical hacking

Scanning a list of targets
05:05

In this lecture we are going to be looking at how to use Nmap for ethical hacking

Excluding targets from a scan
05:24

In this lecture we are going to be looking at how to use Nmap for ethical hacking

Excluding targets with a list
04:50

In this lecture we are going to be looking at how to use Nmap for ethical hacking

Aggressive scanning & OS Detection
06:41
Nmap Syn Scan
03:40
Nmap UDP Scan
02:59
Output Scan Results
05:38
Nmap Scripts
06:18
+ Netcat
3 lectures 20:59
Banner Grabbing With Netcat
03:46
Transferring Data With Netcat
10:15
Reverse Shell With Netcat
06:58
+ Getting started with Metasploit
5 lectures 01:16:53

In this lecture we are going to be looking at how to use Metasploit for ethical hacking

Preview 22:58

In this lecture we are going to be looking at how to use Metasploit for ethical hacking

Metasploit for beginners - Understanding Metasploit Modules
19:38

In this lecture we are going to be looking at how to use Metasploit for ethical hacking

Metasploit for beginners - Information gathering - Auxiliary scanners
12:18

In this lecture we are going to be looking at how to use Metasploit for ethical hacking

Metasploit for beginners - Basic Exploitation
11:47

In this lecture we are going to be looking at how to use Metasploit for ethical hacking

Metasploit community Web GUI - Installation and Overview
10:12
+ Web Server Hacking
4 lectures 46:07

In this lecture we are going to be looking at how to hack web servers.

Preview 15:35

In this lecture we are going to be looking at how to hack web servers.

Web server hacking with Metasploit - FTP backdoor command execution
10:00

In this lecture we are going to be looking at how to hack web servers.

Web server hacking with Metasploit - Metasploit payloads
09:35

In this lecture we are going to be looking at how to hack web servers.

Nikto - Web Vulnerability Scanner
10:57