Pentester Course:Lite Edition - OUTDATED
4.2 (302 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
16,385 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Pentester Course:Lite Edition - OUTDATED to your Wishlist.

Add to Wishlist

Pentester Course:Lite Edition - OUTDATED

Check for new version of this course !
4.2 (302 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
16,385 students enrolled
Last updated 5/2014
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
  • 1 hour on-demand video
  • 1 Supplemental Resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • quick view of course quality
  • getting comfortable with hacking
  • start as a pentester
View Curriculum
  • No skills required
  • Basic computer usage


Certification fees included in the full version course. If you are enrolled in full course, you are eligible to take exam and become certified Pentester by Igneus Technologies.

Video lectures are specially designed to with zoom on timing so that you can enjoy them on your mobile or tablets too !

NOTE: This course is totally a product of Igneus Technologies and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED.

What is Pentesting with Linux?

Penetration testing is the legal and authorized attempt to exploit a computer system with the intent of making a network or system more secure. The process includes scanning systems looking for weak spots, and launching attacks and prove that the system is vulnerable to attack from a real hacker.

Penetration Testing has known by several names:

  • Pen Testing
  • Penetration testing
  • Web/network auditing
  • Ethical Hacking
  • White Hat Hacking

Ethical Hacking/Pentesting is a demand of present era where most of our important tasks include cyber world. Pentesting is a process in which Pentester tests an application, software, network for the possible loopholes and by knowing about these loopholes, Company can take steps to secure their product or Network.

No need to pay extra for having lab access, this course will teach you to create your own lab with minimum configuration.

Igneus Certified Pentester is one of the certification course which is now moving online to serve wider audience at World level. This certification involves lots of in-depth topics covering theory as well as Practical work.

What will you get after completing the course?

  • Immense knowledge about pentesting and Information Security
  • Huge Job opportunities by having a Unique ID certification
  • Full practical and to the point videos will help in fast learning
  • 1 on 1 support to every student by having live sessions every month

Pentesting is considered as 2nd highest paid job and with the increasing online market, information security will surely rise even more in near future.

Who is the target audience?
  • student
  • web developer
  • software developer
  • software tester
Students Who Viewed This Course Also Viewed
Curriculum For This Course
16 Lectures
Pentesting Module 1
6 Lectures 27:06

Penetration testing or pentesting is a process to find various loopholes or vulnerability in any website, application or network. A Pentester is expected to find to all possible attack vectors by various technique so that organization can be secured up to the best mark.

Preview 02:42

Kali Linux is the revised version of BackTrack. It is a Debian based Operating System specially designed for the hackers and pentester to make their life easy. Most of the tools are built in and are in plug and play mode in this Kali Linux.

Preview 04:04

Information security or Hackers job, according to Forbes, is the 2nd highest paid job in the market. Apart from job, it is the highest paid market as a free lancing too. With the help of bug Bounties earning is not at all a problem for a person with Information security skills

Preview 04:09

A lot of people in software industry gives the least priority to security. Informtation security is easy to implement along with the development phase instead of end phase testing.

Every big or small organization needs to protect their data from being hacked and this is where pentester role comes into the play

Why to bother about Security

Hackers are Intelligent Computer Professionals.

White Hat Hackers – They use their knowledge and skill set for good, constructive intents. They find out new security loopholes and their solutions.

Black Hat Hacker- They use their knowledge and skill set for illegal activities, destructive intents.

E.g.- to gain money (online robbery), to take revenge. Disgruntled Employees is the best example of Black Hats. Attackers (Black Hat Hackers) are not at all concerned with security professionals (White Hat hackers). Actually these hackers are Bad Guys!!!

Pentester Communities

A good pentester always follows these strategies:

1. Reconnaissance

2. scanning

3. gaining access

4. maintaining access

5. clearing tracks

Pentester Strategies
Pentesting Module 2
6 Lectures 26:42

Pentesting require a separate testing environment. We will learn what are the requirements and materials to gather from internet.

Lab setup

This video will teach the step by step installation of kali linux. This course prefers to have kali linux inside a virtual box or inside a virtual machine.

Linux Installation

for the testing purposes a lots of different machines are required. this video will show installation of Ubuntu machine on Virtual environment.

Ubuntu Test Virtual Machine

Metasploitable is specially designed Linux to test metasploit and various other tools. Installation of this test machine is required to perform a lots of task

Metasploitable required to test

A basic Linux usage is required to understand kali linux. This video is about basic linux usage for basic commands.

Linux basic usage

This document gives a brief description about history and basic usage command for linux system

History of Linux
16 pages
Pentesting Module 3
1 Lecture 02:53

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC address is hard-coded on a network interface controller (NIC) and cannot be changed. However, there are tools which can make an operating system believe that the NIC has the MAC address of a user's choosing. The process of masking a MAC address is known as MAC spoofing. Essentially, MAC spoofing entails changing a computer's identity, for any reason, and it is relatively easy.

MAC changer in Pentesting linux
Pentesting Module 4
1 Lecture 03:06

Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scan results can be compared with one another to see how they differ. The results of recent scans are stored in a searchable database.

Zenmap usage
Pentesting Module 5
1 Lecture 10:52

The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-the-middle).

SSL man in the middle attacks
End Note
1 Lecture 00:33

Join our full course.

Get certified and become a "Certified Pentester"

Where to go from here!
About the Instructor
Igneus Technologies
4.3 Average rating
2,940 Reviews
77,032 Students
35 Courses
Best Comprehensive Courses

We at Igneus have trained students from IIT's, NIT's and reputed companies. Students from all over the globe have trusted our High quality and affordable trainings from 10+ countries and have opted for our Certification programs.

IGNEUS stands for the Revolutionary and a quality enhanced change that we’ve tried to come up with in the modern world of Internet education. We’ve come up bearing in mind the maximum emphasis on the quality dealing with every new technology which has made us distinguished from the throng at internet. And this revolution of choice will keep continuing. Today IGNEUS Technologies has proudly lifting up the tag of being the world's most trusted provider of myriad of services and training programs aiding constantly in every corner of the globe along with web security aspects, and open source technology.

IGNEUS Technologies Pvt. Ltd is a dream shared and brought up by two computer geniuses to make the society upgraded and aware of the cyber crimes that curb the innocence of environment, thus starting a revolution in favor of cyber security.

Igneus stands for the Revolutionary and a quality enhanced change in every aspect of its touch to internet. Quality dealing with every new technology makes us different from the crowd of internet. The revolution of choice continues. Today Igneus Technologies is the world's most trusted provider of mentioned services and training along with web security aspects, and open source technology.