Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Learn now how to build your $120 000/year career as Ethical Hacker!
A job that can be done from home, coffee shop or remote island!
In order to protect yourself from hackers, you must think as one.
You will learn hacking tools, methodologies and techniques. This is a both practical and theatrical step-by-step course.
This training is based on a practical approach of day-by-day situations and it contain labs based on real environments. For the labs, target virtual machines are provided.
The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.
Below are the main topics, both theoretical and practical, of this course:
Chapter 1: Introduction to Ethical Hacking, Footprinting and Reconnaissance
Chapter 2: Scanning Networks, Enumeration and Vulnerabilities
Chapter 3: System Hacking
Chapter 4: Sniffing
Chapter 5: Metasploit
Chapter 6: Trojans, Backdoors, Viruses and Worms
Chapter 7: Cryptography
Chapter 8: Penetration testing on Wireless Networks
Chapter 9: Penetration Testing
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Introduction to Ethical Hacking. Footprinting and Reconnaissance|
About myself and this course
Introduction to Ethical Hacking. Footprinting and Reconnaissance
Demo - Information Gathering using Google Dorks and DNS Queris
Demo - Scanning and Enumeration
Do it yourself - Information Gathering Exercise
|Section 2: Scanning Networks, Enumeration and Discovering Vulnearbilities|
Scanning and enumerationPreview
Demo - Installing Nessus Scanner
Demo - Use Nessus to Discover Vulnerabilities
Demo - Using Nikto to discover Web Vulnerabilities
Demo - Using Paros for Vulnerability Discovery
Demo - Use Dirbuster to brute force sub-directories and filenames
Do it yourself - Scanning and enumeration, Vulnerability Discovery Exercise
|Section 3: System Hacking and Vulnerability Exploitation|
System hacking - vulnerability exploitation
|Section 4: Sniffing|
|Section 5: Metasploit|
Demo - Exploiting FTP Server Vulnerability using Metasploit
Demo - Post Exploitation Example
Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the Victim PC
Demo - Eploiting Samba Service on Linux using Metasploit
Do it yourself - Vulnerability Exploitation using Metasploit Exercise
|Section 6: Trojans, Backdoors, Viruses and Worms|
Trojans and Backdoors
Computer viruses and worms
|Section 7: Cryptography|
Cryptography and cryptanalysis tools. Cryptography attacks
Demo - Hack SSH passwords using Medusa
Hack the SSH Password using Hydra
Hack Linux Passwords using John the Ripper
Do it yourself - Passwords Protection ExercisePreview
|Section 8: Penetration Testing on Wireless Networks|
Penetration Testing on Wireless Networks
Do it yourself - WiFi Networks Security - practical approach
Case Study – Windows Hosted Network Bug or Feature
|Section 9: Penetration Testing Overview. Final words|
Penetration Testing Overview. Final WordsPreview
Senior Information Security Consultant
I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. Act as an effective participant in multidisciplinary security project team. -Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking). Make recommendations on security weaknesses and report on activities and findings. - Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated) - Security lab fixed and virtual assets design for different LAN / WAN architectures - Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment - Perform analysis and testing to verify the strengths and weaknesses of - Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.) - Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures - Assist with the development of remediation services for identified findings - Customize, operate, audit, and maintain security related tools and applicationsIT Trainer
- Trainer for Web Application Hacking and Network Infrastructure Hacking - Training students for CCNA and CCNA Security Certification - Training NDG Linux Basics - Legal Main Contact - Curriculum Leader
- ISO 270001 Lead Auditor
- ECSA (EC-Council Certified Professional)
- CEH (Certified Ethical Hacker)
- CEI (Certified EC-Council Instructor)
- VMWare vSphere Install, Configure, Manage
- CCNA and CCNA Security
- CCNP Routing and CCNP Switching
- Advanced Linux&InfoSEC
- Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.