Network Penetration Testing (Ethical Hacking) From Scratch
4.4 (35 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
368 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Network Penetration Testing (Ethical Hacking) From Scratch to your Wishlist.

Add to Wishlist

Network Penetration Testing (Ethical Hacking) From Scratch

Learn ethical hacking from scratch from a networking based perspective
4.4 (35 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
368 students enrolled
Last updated 5/2017
English
Current price: $10 Original price: $195 Discount: 95% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 7.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • conduct a basic network penetration test from start to finish from an ethical hackers perspective
View Curriculum
Requirements
  • A basic understanding of networking
  • Be able to understand the basics of using Linux based operating systems
Description

This course aims to teach student's how to become an ethical hacker/penetration tester from a networking perspective from scratch, therefore prior knowledge of the fundamentals of networking and basic Linux commands would be beneficial but not essential. The course covers the entire process of network based ethical hacking from a professional penetration testers point of view. 

The introductory areas cover the ethics and jurisdictional points surrounding penetration testing a client network. The next sections include integral passive and active information gathering functions when conducting a client engagement. 

The course then looks into the various exploitation techniques a hacker would use and accompanies detailed demonstrations of how to find and exploit such issues. Once exploited, the course then looks at post exploitation methods. This includes ways in which an attacker can further exploit the client to gain access to other areas of the network as well as maintain access once exploited.

Finally the course focuses on additional techniques an ethical hacker would take once they have already gained control of a client network and therefore use perspectives such as networking tools similar to Wireshark or TCPDump. In addition other entry points would include hardware tools that can be used for exploitation such as WiFi related hacking, which is only covered from a theoretical point of view within this course. 

Who is the target audience?
  • Beginner level students who are interested in the world of ethical hacking and penetration testing
Compare to Other Ethical Hacking Courses
Curriculum For This Course
70 Lectures
07:20:31
+
Introduction
5 Lectures 36:40


Reporting For a Client
08:46

Glossary of Terms - Part 1
07:13

Glossary of Terms - Part 2
07:23
+
Legal Considerations
2 Lectures 11:01

Legal Considerations Part 2
05:17
+
Setting up Your Environment
11 Lectures 01:10:43

Setting Up Kali- Part 1
07:03

Setting Up Kali- Part 2
07:49

Setting Up Ethical Hacking Tools In Mac OS - Part 1
04:51

Setting Up Ethical Hacking Tools In Mac OS - Part 2
05:57

Vulnhub and Metasploitable 2
07:35

Cloud Services Part 1
06:21

Cloud Services Part 2
05:05

Taking Notes For Client Engagements
06:14

FTP and SFTP
06:38

Running an Apache Web Server and Passing Files Between a Client and Attacker
05:40
+
Passive Information Gathering
3 Lectures 14:19

Passive Information Gathering - Part 2
05:18

Searching For Personnel During a Client Engagement
03:47
+
Active Information Gathering
13 Lectures 01:21:56
Cewl - Collecting Information From a Client Website
04:01


Nmap - Using The Scripting Engine
08:05

Nikto - Searching for Web Based Vulnerabilities
08:34

Openvas - Scanning For Network/Website Related Vulnerabilities
08:25

Dirb/Dirbuster - Brute Forcing Web Directories
08:15

Metasploit - Using the Scanning Based Modules - Part 1
05:41

Metasploit - Using the Scanning Based Modules - Part 2
04:18

Ncat - Banner Grabbing - Part 1
04:29

Ncat - Banner Grabbing - Part 2
04:56

DNS Enumeration - Part 1
05:23

DNS Enumeration - Part 2
05:26

SMB Enumeration
07:31
+
Exploitation
20 Lectures 02:05:20

Metasploit - Exploit
07:54

Metasploit - Payload
06:06

MSFvenom - Creating a custom payload
06:55

Burpsuite - Web Proxy
08:37

Zap - Web Proxy
07:06

SQL Injection - How to
07:46

SQL Injection - NoSQL How to
05:08

Pret - Exploiting Printers
06:54

LFI & RFI - Local File Inclusion & Remote File Inclusion
05:47

Veil - Evading Anti Virus - Part 1
04:04

Veil - Evading Anti Virus - Part 2
06:06

Using a Reverse Shell - Part 1
04:45

Using a Reverse Shell - Part 2
04:46

Patator - Password Attacks - Part 1
07:37

Patator - Password Attacks - Part 2
04:38

BOF - What is a Buffer Overflow
05:20

BOF - Buffer Overflow Demo - Part 1
07:39

BOF - Buffer Overflow Demo - Part 2
07:24

BOF - Buffer Overflow Demo - Part 3
05:08
+
Phishing - What is Phishing and Tools Used for Phishing
1 Lecture 08:30
Phishing
08:30
+
Post Exploitation
10 Lectures 01:05:52

Windows Machine - Part 2
04:55

Linux Machine Part 1
06:20

Linux Machine Part 2
04:21

Mimikatz - Extracting Hashes From Memory
08:35

FGdump - Extracting Password Hashes
06:37

Cracking Hashes
06:44

Pivoting - Part 1
07:14

Pivoting - Part 2
05:19

Persistance - Maintaining Access to a Client Machine
09:07
+
Other Techniques
5 Lectures 26:10
Wireshark - Part 1
05:26

Wireshark - Part 2
05:58

TCPDump
04:59


Hardware - Part 2
03:44
About the Instructor
TWR Internet Solutions Ltd
4.3 Average rating
189 Reviews
1,311 Students
3 Courses
Providing high quality, affordable material

TWR Internet Solutions Ltd was formed as part of a collaboration of experts specialising in networking, forensics, programming and ethical hacking. The team each have over ten years experience in their specific fields, the company belief is to provide affordable training of a high standard to help aid people from all backgrounds in getting into specialist fields of computing.