Make in-house Hacking & Pentesting lab
4.8 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
449 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Make in-house Hacking & Pentesting lab to your Wishlist.

Add to Wishlist

Make in-house Hacking & Pentesting lab

Build your "Hacking" lab on your own laptop / computer to improve your skills
4.8 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
449 students enrolled
Created by Atul Tiwari
Last updated 3/2017
English
Current price: $10 Original price: $120 Discount: 92% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Start penetration testing with your single computer and build own LAB
  • Start penetration testing for networks, computers, and web applications attacks practices
  • Everything will be in self controlled environment
View Curriculum
Requirements
  • Basic computing knowledge with internet
  • A computer with good internet connectivity
  • No much technical knowledge required
Description

Why do you need a pentest lab ? Simple! If you aspire to be a pentester, or want to improve your skills, in-house pentest labs are one of the best way to practice! This course is for same that gives you hands on knowledge about Building your own virtual penetration testing labs on virtual machine for Penetration testing, Web application security analysis, Web app pen-testing, Network security.

It also gives you techniques for Firewall Evasion, IDS bypassing, WAF Evasion techniques.

It best suites for people who is keen to make testing with their own and only one computer. it doesn't require too much knowledge to set it up. 

Just you need to have understanding of computer and basic computing skills to start with. 

This course is highly focused towards practical from scratch to advanced level towards penetration testing on virtual machine.

This course is very helpful for newcomers in ethical hacking and penetration testing field.

In this course, you also get where to start penetration testing and ethical hacking knowledge.

Who is the target audience?
  • Any person willing to learn how to make their own penetration testing lab
  • Information security perofessionals
  • Penetration testers / Ethical hackers
Students Who Viewed This Course Also Viewed
Curriculum For This Course
17 Lectures
01:17:31
+
Introduction
1 Lecture 01:02
+
Tools / softwares
1 Lecture 02:19
Tools_softwares you needed for virtual pentesting lab
02:19
+
Setting-up LAB on virtual machines
5 Lectures 16:15

setting-up KALI linux: part-2
04:27

Setting-up Owaspbwa VM
03:17

Setting-up windows VM
01:40

Installing Metasploitable on virtual machine
03:29
+
Penetration testing methodologies and KALI linux
2 Lectures 09:03
Penetration Testing methodologies
02:25

+
Burp suite attacks
2 Lectures 10:56
Firing-up burp suite
02:35

Finding vulnerabilities by fuzzing input parameters, like sql injection, xss attacks, csrf etc.

Fuzzing input parameters for loopholes,security testing, input validation attack
08:21
+
Penetration testing LABS
2 Lectures 07:26
Web app penetration testing LAB - I
03:51

Web app penetration testing LAB - II
03:35
+
Nmap scan techniques - pentesting mode
2 Lectures 12:13

This is NMAP through scanning techniques that is used widely in penetration testing phases. I personally use these techniques to figure out the target details at the time of real world penetration testing, so i have included a part of scanning methods for NMAP Tool.

Nmap scan - Pentesting mode
10:06

In this section you will get script scanning method in NMAP to scan vulnerabilities directly from NMAP database.

Nmap - Script scanning
02:07
+
Firewall, IDS evasion - Pentesting
2 Lectures 18:17
Firewall, IDS Evasion with NMAP - Pentesting
07:18

Bypass firewall in real examples. i have bypassed windows 7 firewall with detailed attackes and scanning techniques. using the same method we can bypass every firewall, IPS, IDS, UTMs etc.

Firewall evasion Part-2 Real world example on windows 7
10:59
About the Instructor
Atul Tiwari
4.2 Average rating
366 Reviews
29,853 Students
2 Courses
Ethical hacker | Security Evangelist | Penetration Tester

Security Analyst | IT AUDITOR | Cyber laws expert | Author | Public speaker | CISSP

Having more than 10 years of working experience in information security field.

Have trained more than 35000 students on the topic of Information security & penetration testing in classroom mode and online across 162 countries. with expertise in web application penetration testing, i have performed several penetration tests and security audits, security analysis with private, governments and security agencies to help assist with to cope with cyber threats.