Network Penetration Tester - Jump Up A Level In Your Career
4.0 (48 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,327 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Network Penetration Tester - Jump Up A Level In Your Career to your Wishlist.

Add to Wishlist

Network Penetration Tester - Jump Up A Level In Your Career

You will learn hacking tools, methodologies and techniques. This is a both practical and theoretical step-by-step course
4.0 (48 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,327 students enrolled
Created by Gabriel Avramescu
Last updated 1/2016
English
Price: $130
30-Day Money-Back Guarantee
Includes:
  • 4 hours on-demand video
  • 6 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand and perform the basic steps in order to performa penetration testing of an infrastructure or other computers in the network
  • Be able to gather information about your target
  • You will learn how to find open ports your target
  • You will learn how to find vulnerabilities in your target infrastructure
  • Exploit found vulnerabilities
  • Sniff and analyze network traffic
  • You will learn how to exploit Windows and Linux Systems
  • Understand and perform attacks using Metasploit
  • Understand cryptography
  • Understand the difference between backdoors, viruses and worms. Learn the basics of how to analyse them
  • Hack wireless networks
  • Understand the penetration testing process
  • As a network administrator you will learn how to secure your network
View Curriculum
Requirements
  • Basic IT skills
  • Basic knowledge of Linux and/or Windows
  • Understand basic computer networking
Description

Learn now how to build your $120 000/year career as Ethical Hacker!

A job that can be done from home, coffee shop or remote island!

In order to protect yourself from hackers, you must think as one.

You will learn hacking tools, methodologies and techniques. This is a both practical and theatrical step-by-step course.

This training is based on a practical approach of day-by-day situations and it contain labs based on real environments. For the labs, target virtual machines are provided.

The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.

Below are the main topics, both theoretical and practical, of this course:

Chapter 1: Introduction to Ethical Hacking, Footprinting and Reconnaissance

Chapter 2: Scanning Networks, Enumeration and Vulnerabilities

Chapter 3: System Hacking

Chapter 4: Sniffing

Chapter 5: Metasploit

Chapter 6: Trojans, Backdoors, Viruses and Worms

Chapter 7: Cryptography

Chapter 8: Penetration testing on Wireless Networks

Chapter 9: Penetration Testing

Who is the target audience?
  • Anyone who want to learn the ethical hacking and penetration testing process
  • Network and Security Engineers
  • IT students
  • Anyone who wants to start a career in it security field or as "ethical hacker"
Students Who Viewed This Course Also Viewed
Curriculum For This Course
36 Lectures
05:10:11
+
Introduction to Ethical Hacking. Footprinting and Reconnaissance
5 Lectures 38:34

About myself and this course

Preview 01:14

Introduction to Ethical Hacking. Footprinting and Reconnaissance
24:55

Demo - Information Gathering using Google Dorks and DNS Queris
04:17

Demo - Scanning and Enumeration
08:08

Do it yourself - Information Gathering Exercise
18 pages
+
Scanning Networks, Enumeration and Discovering Vulnearbilities
8 Lectures 38:08

Vulnerabilties Identification
08:28

Demo - Installing Nessus Scanner
03:31

Demo - Use Nessus to Discover Vulnerabilities
04:42

Demo - Using Nikto to discover Web Vulnerabilities
04:51

Demo - Using Paros for Vulnerability Discovery
04:48

Demo - Use Dirbuster to brute force sub-directories and filenames
02:50

Do it yourself - Scanning and enumeration, Vulnerability Discovery Exercise
8 pages
+
System Hacking and Vulnerability Exploitation
3 Lectures 24:49
System hacking - vulnerability exploitation
05:58

Passwords
11:56

Authentication
06:55
+
Sniffing
1 Lecture 15:00
Sniffing
15:00
+
Metasploit
6 Lectures 43:19
Metasploit
17:08

Demo - Exploiting FTP Server Vulnerability using Metasploit
11:48

Demo - Post Exploitation Example
01:07

Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the Victim PC
10:07

Demo - Eploiting Samba Service on Linux using Metasploit
03:09

Do it yourself - Vulnerability Exploitation using Metasploit Exercise
24 pages
+
Trojans, Backdoors, Viruses and Worms
2 Lectures 14:14
Trojans and Backdoors
05:00

Computer viruses and worms
09:14
+
Cryptography
7 Lectures 32:55
Cryptography concepts
04:56

Cryptographic Algorithms
11:09

Cryptography and cryptanalysis tools. Cryptography attacks
03:02

Demo - Hack SSH passwords using Medusa
05:14

Hack the SSH Password using Hydra
05:05

Hack Linux Passwords using John the Ripper
03:29

+
Penetration Testing on Wireless Networks
3 Lectures 17:38
Penetration Testing on Wireless Networks
06:56

Do it yourself - WiFi Networks Security - practical approach
15 pages

Case Study – Windows Hosted Network Bug or Feature
10:42
+
Penetration Testing Overview. Final words
1 Lecture 05:34
About the Instructor
Gabriel Avramescu
3.8 Average rating
356 Reviews
5,243 Students
8 Courses
Senior Information Security Consultant, IT Trainer

Senior Information Security Consultant

I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. Act as an effective participant in multidisciplinary security project team. -Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking). Make recommendations on security weaknesses and report on activities and findings. - Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated) - Security lab fixed and virtual assets design for different LAN / WAN architectures - Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment - Perform analysis and testing to verify the strengths and weaknesses of - Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.) - Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures - Assist with the development of remediation services for identified findings - Customize, operate, audit, and maintain security related tools and applications

IT Trainer

- Trainer for Web Application Hacking and Network Infrastructure Hacking - Training students for CCNA and CCNA Security Certification - Training NDG Linux Basics - Legal Main Contact - Curriculum Leader

Certifications

- OSCP

- CREST CRT (Registered Penetration Tester)

- ISO 270001 Lead Auditor

- ECSA (EC-Council Certified Professional)

- CEH (Certified Ethical Hacker)

- CEI (Certified EC-Council Instructor)

- VMWare vSphere Install, Configure, Manage

- CCNA and CCNA Security

- CCNP Routing and CCNP Switching

- Advanced Linux&InfoSEC

- Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.