Top 5 Tools & Techniques for Ethical Hacking/Pentesting 2020
4.3 (196 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
17,953 students enrolled

Top 5 Tools & Techniques for Ethical Hacking/Pentesting 2020

Most used Industry tools for Ethical Hacking, Pentesting & Bug Bounty Hunting
Hot & New
4.3 (196 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
17,953 students enrolled
Last updated 7/2020
English
English [Auto]
Current price: $62.99 Original price: $89.99 Discount: 30% off
23 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 4 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Ethical Hacking Techniques
  • Penetration Testing Techniques
  • Bug Bounty Techniques
  • Nmap
  • Burp Suite
  • Dirsearch
  • Google Hacking Database
  • Google Dorks
  • Github Recon
  • Shodan
  • Censys
  • HTTP Requests
  • XML to CSV for Recon
  • Decoy Scans Bypass Firewalls
  • Exploit PUT to RCE
  • Sensitive Data Exposure
Requirements
  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory & Internet Connection
  • Operating System: Windows / OS X / Linux
Description

Welcome to Top 5 Tools & Techniques for Pentesting in Cyber Security Course. This course covers Top 5 Tools and approach for web application attacks and how to earn bug bounties. There is no prerequisite of prior hacking knowledge and you will be able to perform web attacks and hunt bugs on live websites and secure them.

This course is not like other hacking or penetration testing course with outdated vulnerabilities and only lab attacks.

This course will start with an understanding of each tool that is used in the industry by the experts for Penetration Testing.

This course is highly practical and is made on Tools used by professionals in the industry to give you the exact environment when you start your penetrating testing or bug hunting journey.

We will start from the basics and go till the advance of the particular tool.

This course is divided into a number of sections, each section covers how to hunt vulnerability in an ethical manner.


In Nmap, We will cover what is Nmap, Installation, Firewall Bypass Techniques, and Nmap cheatsheet.

In Burpsuite, We will cover what is Burpsuite, Installation, and We will see practical examples of How Interception Works. We will also solve a CTF based on a realtime example using burpsuite.

In Content Discovery, We will cover what is Project Discovery's Data set for subdomains and increase the scope for Bug Bounty Hunting.

We will also see tools to scope expansion wherein we can identify mass subdomains are alive, dead based on status codes, Title, etc.

In Google Hacking Database, We will cover what is GHDB, How you can hunt for sensitive files for a target, Also you will learn How to become the author of your own Google Dork

In Shodan/Censys/Grey Noise, We will cover what is IOT Search Engines, How you can perform banner grabbing, and find out vulnerable and outdated servers running on the targets. We will also see how to use shodan search filters for better active enumeration.

In Github Recon, We will cover what is Github Recon both Automated and Manual Way. We will uncover sensitive information from Github repositories that fall under Sensitive Data Exposure as a P1 severity bug.

In the Anatomy of an HTTP Request, We will cover what is an HTTP Request, What are different Headers How do they work and its significance.


With this course, you get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you as soon as possible.

Notes:

  • This course is created for educational purposes only and all the websites I have performed attacks are ethically reported and fixed.

  • Testing any website which doesn’t have a Responsible Disclosure Policy is unethical and against the law, the author doesn’t hold any responsibility.

Who this course is for:
  • Anybody interested in learning website & web application hacking / penetration testing.
  • Any Beginner who wants to start with Penetration Testing
  • Any Beginner who wants to start with Bug Bounty
  • Trainer who are willing to start teaching Pentesting
  • Any Professional who working in Cyber Security and Pentesting
  • Developers who wants to fix vulnerabilities and build secure applications
Course content
Expand all 39 lectures 04:14:13
+ Nmap - The Network Mapper
11 lectures 01:08:58
Why Nmap
03:08
Nmap Installation Windows
02:45
Nmap Installation Linux
01:55
Nmap Email Enumeration
02:31
Nmap Fake TTL
04:33
Nmap RCE Method Exploitation
11:16
Nmap Spoof MAC Address
06:30
Nmap Cheatsheet
24:31
+ Burpsuite
2 lectures 25:11
Burp Suite Setup and Practical
17:11
Burpsuite CTF Approach
08:00
+ Google Hacking Database
2 lectures 27:19
Google Dorks
20:53
Become Author of your Google Dork
06:26
+ Content Discovery Tools
5 lectures 26:38
Sublist3r
07:01
Project Discovery Subdomains
05:26
Resolving IP's & Domains + CIDR
04:47
Resolving Subs + Status Code + Banner Grab
05:23
+ Github Recon
2 lectures 12:39
Automated Way
08:05
Manual Way
04:34
+ Linux
1 lecture 13:09
Installation of Linux Kali 2020.2
13:09
+ Shodan
15 lectures 01:09:37
Installation & Lab Setup
03:41
Shodan API Setup
02:46
Shodan Information & Count
05:20
Shodan Scan Downloads
07:04
Shodan Host Enumeration
05:35
Shodan Parse Dataset
03:34
Shodan Search Query
02:47
Shodan Scan Commands
08:11
Shodan Stats
03:01
Shodan GUI
05:29
Shodan Report Generation
04:11
Shodan Report Generation 2
05:33
Shodan Images
04:54
Shodan Exploits
04:18
Bonus: Shodan Extension
03:13
+ Anatomy of HTTP Request
1 lecture 10:42
Breakdown of HTTP Request
10:42