Become a Professional Penetration Tester
3.8 (9 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,765 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Become a Professional Penetration Tester to your Wishlist.

Add to Wishlist

Become a Professional Penetration Tester

If you want to continue your career as an information security expert and pentester ,you are right place.
3.8 (9 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,765 students enrolled
Last updated 6/2016
English
Current price: $10 Original price: $95 Discount: 89% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 5.5 hours on-demand video
  • 22 Articles
  • 27 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Answers to every single question you have about ethical hacking and penetration testing from an experienced IT professional!
  • Tips for remaining anonymous in hacking and penetration testing activities.
  • You Will Learn What is Pentest
  • A complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords.
  • You Will Learn How To Become a Pentester
  • You will learn Kali Linux OS
  • You will learn Metasploit framework
  • You Will Learn Meterpreter
  • You Will Learn Ethical Hacking Methods
  • You Will have Your Own Pentest Lab Environment
  • You will learn exploiting a vulnerability with Metasploit framework
  • You will learn Arp poisoning attack
  • You will have A-lot of real life pentest Scenario videos
  • You Will Learn Hacking Linux And Windows
  • You Will Learn Post Exploitation Methods
  • You Will learn All of Network Pivoting Methods
View Curriculum
Requirements
  • Reliable and fast internet connection.
Description

LINUX FUNDAMENTALS

VMWARE PLAYER INSTALLATION

KALI LINUX INSTALLATION

LINUX NETWORK CONFIGURATION

LINUX BASIC COMMANDS

LINUX DIRECTORY STRUCTURE


NETWORK FUNDAMENTALS

NETWORK BASICS

NETWORK DEVICES

OSI MODELS

TCP/IP



WHAT IS HACKER , WHITE HACKER AND PENTEST?

PENTEST

 

 

TOR NETWORK

TOR NETWORK & USING NMAP, SQLMAP AND METASPLOIT WITH TOR & WHONIX ANONYMOUS OPERATING SYSTEM

 

 

INFORMATION GATHERING ABOUT TARGET SYSTEM

RECONNAISSANCE AND VULNERABILITY SCANNING AT PENETRATION TEST

NMAP GUIDE

PENTEST SCENARIO -1

PENTEST SCENARIO -2

NESSUS VULNERABILITY SCANNER

 

 

METASPLOITE

METASPLOITE GUIDE

MAKE UNDETECTABLE MALWARE WITH METASPLOITE

MAKE UNDETECTABLE PHP AND ASP SHELL

MAKE AN INFECTED PDF FILE

PENTEST SCENARIO -3

PENTEST SCENARIO -4

PENTEST SCENARIO -5

PENTEST SCENARIO -6

 

 

WEB APPLICATION ATTACKS

WEB FUNDAMENTALS

WEB APPLICATION SECURITY

HTTP BASIC AUTHENTICATION DICTIONARY ATTACK WITH BURPSUITE

BRUTE FORCE TO WEB FORM BASED AUTHENTICATION WITH FIREFORCE

DICTIONARY ATTACK TO FORM BASED AUTHENTICATION WITH BURPSUITE

CROSS SITE SCRIPTING(XSS)

BEEF – THE BROWSER EXPLOTION FRAMEWORK PROJECT

SQL INJECTION

STEP BY STEP SQL INJECTION ATTACK – DEMO 1

STEP BY STEP SQL INJECTION ATTACK – DEMO 2

AUTHENTICATION BYPASS WITH SQL INJECTION

SQLMAP

SQL INJECTION THROUGH LIVE HTTP HEADERS & BYPASS CLIENT SIDE SECURTY PROTECT

LOCAL FILE INCLUSION EXPLOITATION

REMOTE FILE INCLUSION (RFI)

DIRECTORY THAVERSAL ATTACK

CSRF(CROSS SITE REQUEST FORGERY)

FINDING TARGET WEB SERVER INFORMATIONS

OWASP-ZAP OPEN SOURCE WEB APPLICATION SECURITY SCANNER

W3AF OPEN SOURCE WEP APPLICATION SECURITY SCANNER

 

 

SOCIAL ENGINEERING ATTACKS

SETOOLKIT

MALWARE INFECTED WORD FILE

 

LOCAL NETWORK ATTACKS

MAN IN THE MIDDLE ATTACK(MITM)

 

DECRYPTION METHODS

CREATE WORDLIST WITH CRUNCH

PASSWORD HASH CRACKING – OFFLINE CRACKING ATTACKS

BRUTE FORCING PASSWORD WITH MEDUSA, HYDRA AND NCRACK(ONLINE PASSWORD ATTACKS)

 

 

WIRELESS HACKING

CONFIGURE WIFI ADAPTOR TO MONITORING MODE

EASY-CREDS FAKE ACCESS POINT ATTACK

CRACKING WEP PASSWORDS WITH AIRCRACK-NG

CRACKING WPA/WPA2 PASSWORDS WITH AIRCRACK-NG

HACK WIFI BY WPS PIN ATTACK

CRACKING WPA HANDSHAKE BY PYRIT MORE QUICKLY

CRACK PASSWORD HASHES WITH OCLHASHCAT PROGRAM

EVIL TWIN ATTACK ( HACK WPA/WPA2 WITHOUT USING BRUTE FORCE OR DICTIONARY ATTACK)

 

 

DDOS ATTACKS

DISTRIBUTED DENIAL OF SERVICE ATTACK (DDOS)

SYN FLOOD ATTACK

UDP FLOOD & DNS FLOOD & DNS AMPLIFICATION ATTACKS

HTTP FLOOD ATTACK

Who is the target audience?
  • You can begin this course with any level of knowledge and quickly start advancing your skills as an information technology and security expert anywhere in the world!
  • If you are working to advance your career on LinkedIn or as a freelancer online, you can use the skills you build in this course to get a better job and to increase your hourly pay rate.
  • If you are hoping to be a better network administrator, you can use this course to learn how to secure networks and protect assets.
  • Anyone Who want to learn ethical Hacking
  • People who interested in hacking
  • System Admins
  • Penetration testers
Students Who Viewed This Course Also Viewed
Curriculum For This Course
59 Lectures
05:36:50
+
WELCOME
2 Lectures 01:13

Course Notes and Lab Environment
00:13
+
LINUX & NETWORK FUNDAMENTALS
4 Lectures 00:09
Vmware Player Installation
00:00

Kali Server Installation
00:00

LINUX NETWORK CONFIGURATION   

LINUX BASIC COMMANDS 

LINUX DIRECTORY STRUCTURE

Linux Fundamentals
00:04

NETWORK FUNDAMENTALS
 
NETWORK DEVICES

OSI MODELS
 
TCP/IP

Network Fundamentals
00:03
+
TOR NETWORK
1 Lecture 00:00
Tor Network & Usıng Nmap, Sqlmap And Metasploıt Wıth Tor & Whonıx
00:00
+
INFORMATION GATHERING ABOUT TARGET SYSTEM
5 Lectures 30:12
Reconnaıssance And Vulnerabılıty Scannıng At Penetratıon Test
00:00

Nmap Guıde
00:00

Pentest Scenario 1 -Nmap NSE Script -Hacking Ftp Server
11:45


nessus user:ceh
password:123321

Nessus Vulnerabılıty Scanner
11:45
+
METASPLOIT
9 Lectures 01:11:21
Metasploit , Meterpreter and Post Explotion Methods Guıde
00:00

Make Undetectable Malware Wıth msfpayload & msfencode
05:19

Make Undetectable Malware With Msfvenom
05:29

Make Undetectable Php And Asp Shell
02:53

Make An Infected Pdf File
06:36

Post Explotion Methods

Pentest 3 - MetaSploite Hacking Windows Server
17:55

Post Explotion Methods

Pentest 4 - Metasploite -Hacking Tomcat Web Server
08:22

Post Explotion Methods

Pentest 5-Hack Linux Server And Get Root Permissons On Linux Server
07:53

Post Explotion Methods-  Network Pivoting

Pentest 6- Hack Servers With Using Network Pivoting Methods
16:54
+
WEB APPLICATIONS ATTACKS & WEP APLICATION SECURITY
20 Lectures 02:32:14
Web Applıcatıon Securıty
00:00

Http Basic Authentication Dictionary Attack With Burpsuite Program
10:17

Brute Force To Web Form Based Authentication With Fireforce
04:47

Dictionarry Attack To web Form Based Authentication With Burpsuite Program
06:05

Cross Site Scripting Attack (XSS)
06:38

Beef - The Browser Explotion Framework Project
09:03

Sql Injectıon
00:00

Step By Step Sql Injection Demo 1
12:17

Step By Step Sql Injection Demo 2
07:09


Sqlmap
09:09

Sql Injectıon Through Lıve Http Headers & Bypass Clıent Sıde Securty Protect
05:15

Local Fıle Inclusıon Exploıtatıon
10:27

Remote Fıle Inclusıon (Rfı)
13:18

Dırectory Thaversal Attack
03:34

Csrf(Cross Sıte Request Forgery)
10:27

Fındıng Target Web Server Informatıons
15:29

Owasp-Zap Open Source Web Application Security Scanner
04:56

W3af Open Source Web Application Security Scanner
10:50

Pentest 7 -Access Admin Panel With Bypass Security Measures
06:40
+
SOCIAL ENGINEERING ATTACKS
2 Lectures 18:27
Setoolkıt
11:12

Malware Infected Word Fİle
07:15
+
LOCAL NETWORK ATTACKS AND PROTECT METHODS
1 Lecture 16:27
Man İn The Middle Attack(Mitm)
16:27
+
DECRYPTION METHODS
3 Lectures 00:00
Create Wordlist With Crunch
00:00

Password Hash Cracking- Offline Cracking Attacks
00:00

Medusa & Hydra & Ncrack - Bruteforcing Password
00:00
+
WIRELESS HACKING
8 Lectures 46:52
Configure Wifi Adaptor To Monitoring Mode
04:03


Cracking wep Passwords With Aircrack-Ng
00:00

Cracking Wpa/Wpa2 Passwords With Aircrack-Ng
08:14

Cracking Wpa Handshake By pyrit More Quickly
00:00

Hack Wifi By Wps Pin Attack
00:00

Crack Password Hashes With OclHashcat Program
00:00

Evil Twin Attack ( Hack Wpa/Wpa2 Without Using Brute Force Or Dictionary Attack)
19:58
1 More Section
About the Instructor
OS Information Security
3.2 Average rating
328 Reviews
3,011 Students
6 Courses
Computer Engineer

I am computer engineer and i am working as a system engineering at University(+10k) for 5 years. 

I am CEH,RHCSA,RHCE,Strata,A+,N+,CSCU.I have a 5 years of experience as Technical Trainer.I have given lots of training to IT Professionals,Students .I have taken lots of seminars in Schools and Colleges .I have given full time dedication to this field.I have a keen interest in the field of hacking and network security and adopted this field as my full-time employment.I enjoys computer Security topics.


MY COURSES

Linux From Strach

Linux Hardening

Ethical Hacking

MY COMPETENCES

Linux

Centos

Metasploit

Nmap

Opensource

Kvm

Server Hardening

TCP/IP

Advanced Bash Scripting

Php,Http,Mysql,Javascript

Pfsense

Information Security

Network Security

Certified Ethichal Hacker

Licensed Penetration Tester