Real world Hacking & Penetration testing - Updated 2018
4.5 (607 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
31,348 students enrolled

Real world Hacking & Penetration testing - Updated 2018

Professional Level Ethical Hacking & Penetration testing from Beginner to Advanced - From Real World Experience!
4.5 (607 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
31,348 students enrolled
Created by Atul Tiwari
Last updated 8/2018
English
English [Auto-generated]
Current price: $10.00 Original price: $194.99 Discount: 95% off
30-Day Money-Back Guarantee
This course includes
  • 5.5 hours on-demand video
  • 3 articles
  • 7 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to Udemy's top 3,000+ courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Perform penetration testing computers, networks, wireless, web apps and secure computers and networks by exposing vulnerabilities and patching them.
  • Discover and exploit what a modern penetration tester does.

  • Penetrate and Exploit even highly secured environments

  • Effectively execute modern attack techniques
  • Use commercial / open-source penetration testing tools to efficiently assess traditional and non-traditional networks
  • Do not need to code, Hack from real world tools, scripts on your own.
  • Develop strategies for communicating risk that impacts an organization's security posture
  • Ethical hacking and penetration testing
  • Cyber security tools and techniques
Requirements
  • Basic computing knowledge with internet and networking.
  • keen interests to equip yourself with latest hacking tools and tricks.
Description
  • First thing first - This course is updated every months with new lessons, new updates, new tricks and tips!

If you are wanting to learn Ethical Hacking and Penetration Testing to a Professional Standard, and work online to help companies secure their data, you will love this Udemy Course!

In this highly practical course, you will learn from a Certified Professional Hacker & Penetration tester. You will get practical details about what a modern pen-tester must have in order to be a professional level Penetration Tester.

This course covers, Computer Attacks, Networks Attacks, Web Applications Penetration Testing and Security, Exploits, VAPT, Automated Attacks, Firewall & AV Evasion, Veil-Evasion, DARKNET, Wireless attacks, Social-Engineering attacks, Best Commercial Tools and my tips at professional level from real world examples of  penetration testing. 

This course has been designed so students from non-technical background can learn with ease and use these skills to be a good Penetration Tester.

The course has been developed by myself after several research and development projects. This 100% practical course is for anyone wanting to be a competent Information Security Professional and Penetration Tester.

All the modules are independent, so you can start any module you want, but I recommend to learn the course in chronological order.

If for what ever reason, this course does not meet with your expectations, you will have Udemy's 30 days 'no questions asked' money back guarantee!

** Don't Delay, every second could be costing you money, and professional skills! ***


Who this course is for:
  • People willing to acquire deep understanding of thoroughly Professional Penetration testing.
  • Ethical hackers
  • Penetration testers
  • Web application security
  • Cyber enthusiasts
  • Security admin
  • Network security
Course content
Expand all 57 lectures 05:43:26
+ Introduction to penetration testing and ethical hacking
3 lectures 17:35

Taking a hands-on approach to identify technologies running at server side

Preview 02:45

HTTP and HTTPS insights in detailed to make web application security testing further

HTTP Protocol basics
10:48
+ Building your penetration testing Box (LAB)
4 lectures 11:26
Setting-up OWASPbwa VM
03:17
Setting-up KALI LINUX vm
04:27
Setting-up metasploitable
02:02
Setting-up Windows VM
01:40
+ Penetration Testing methodologies
1 lecture 02:25
Penetration Testing methodologies
02:25
+ Passive Discovery - Open Source Intelligence gathering
5 lectures 57:22
Open source intelligence gathering - Basics
04:05
Open source intelligence gathering - Recon-ng
14:03
Open source intelligence gathering - DiscoverScript
13:41
Open-source intelligence gathering - Spiderfoot
06:14
Recon-ng - Complete info data - Refined
19:19
+ Active Discovery - Reconnaissance
3 lectures 21:20
Active Reconnaissance with Sparta
09:19
Scanning Entire network in 6 minutes
08:13
Taking massive snapshot of web
03:48
+ Vulnerability Assessments
7 lectures 54:56
Vulnerability Assessment - Nessus
14:28
Vulnerability Assessment - OpenVAS
16:25
Vulnerability Assessment - Nikto
04:41
Quick findings of web apps vulnerabilities
02:04
ZAP scan analysis
05:23
Web application scanning - AppSpider_pro
07:15
+ Vulnerability to Exploitation - Exploiting the targets
5 lectures 43:31
Metasploit Commanding
09:03
Metasploit - Exploiting MS08-067
08:44
Metasploit - Exploiting web apps
07:31
Binary Exploitation - Buffer overflow attack
08:42
Browser Exploitation with BeEF
09:31
+ Web application Penetration testing - Exploitation
4 lectures 28:07
Exploiting SQL Injection
08:33
Cross Site Scripting attacks - XSS
05:13
Cross Site Request Forgery attack - CSRF
06:00
Fuzzing Input fields
08:21
+ Wireless Network Hacking
1 lecture 06:48
WPA/WPA2 Cracking ( wireless security testing )
06:48
+ Post Exploitation attacks - Lateral Moving in Networks
5 lectures 19:14
First post Responder
05:31
Adding user account to target machine
02:25
Creating persistent backdoor on target machine
03:30
Dumping cached credentials ( last 10 passwords )
01:59