The Ultimate Ethical Hacking Course 2017-Real world example
4.2 (373 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
30,405 students enrolled
Wishlisted Wishlist

Please confirm that you want to add The Ultimate Ethical Hacking Course 2017-Real world example to your Wishlist.

Add to Wishlist

The Ultimate Ethical Hacking Course 2017-Real world example

Professional Level Ethical Hacking & Penetration testing from Beginner to Advanced - From Real World Experience!
4.2 (373 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
30,405 students enrolled
Created by Atul Tiwari
Last updated 6/2017
English
Current price: $15 Original price: $195 Discount: 92% off
30-Day Money-Back Guarantee
Includes:
  • 5 hours on-demand video
  • 3 Articles
  • 6 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Perform penetration testing computers, networks, wireless, web apps and secure computers and networks by exposing vulnerabilities and patching them.
  • Discover and exploit what a modern penetration tester does.
  • Penetrate and Exploit even highly secured environments
  • Effectively execute modern attack techniques
  • Use commercial / open-source penetration testing tools to efficiently assess traditional and non-traditional networks
  • Do not need to code, Hack from real world tools, scripts on your own.
  • Develop strategies for communicating risk that impacts an organization's security posture
View Curriculum
Requirements
  • Basic computing knowledge with internet and networking.
  • keen interests to equipe themselves with latest hacking tools and tricks.
Description

If you are wanting to learn Ethical Hacking and Penetration Testing to a Professional Standard, and work online to help companies secure their data, you will love this Udemy Course!

In this highly practical course, you will learn from a Certified Professional Hacker & Penetration tester. You will get practical details about what a modern pen-tester must have in order to be a professional level Penetration Tester.

This course covers, Computer Attacks, Networks Attacks, Web Applications Penetration Testing and Security, Exploits, VAPT, Automated Attacks, Firewall & AV Evasion, Veil-Evasion, DARKNET, Wireless attacks, Social-Engineering attacks, Best Commercial Tools and my tips at professional level from real world examples of  penetration testing. 

This course has been designed so students from non-technical background can learn with ease and use these skills to be a good Penetration Tester.

The course has been developed by myself after several research and development projects. This 100% practical course is for anyone wanting to be a competent Information Security Professional and Penetration Tester.

All the modules are independent, so you can start any module you want, but I recommend to learn the course in chronological order.

If for what ever reason, this course does not meet with your expectations, you will have Udemy's 30 days 'no questions asked' money back guarantee!

** Don't Delay, every second could be costing you money, and professional skills! ***


Who is the target audience?
  • People willing to acquire deep understanding of thoroughly Professional Penetration testing.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
53 Lectures
05:01:12
+
Introduction to penetration testing and ethical hacking
1 Lecture 04:02
+
Building your penetration testing Box (LAB)
4 Lectures 11:26
Setting-up OWASPbwa VM
03:17

Setting-up KALI LINUX vm
04:27

Setting-up metasploitable
02:02

Setting-up Windows VM
01:40
+
Penetration Testing methodologies
1 Lecture 02:25
Penetration Testing methodologies
02:25
+
Passive Discovery - Open Source Intelligence gathering
4 Lectures 38:03
Open source intelligence gathering - Basics
04:05

Open source intelligence gathering - Recon-ng
14:03

Open source intelligence gathering - DiscoverScript
13:41

Open-source intelligence gathering - Spiderfoot
06:14
+
Active Discovery - Reconnaissance
3 Lectures 21:20
Active Reconnaissance with Sparta
09:19

Scanning Entire network in 6 minutes
08:13

Taking massive snapshot of web
03:48
+
Vulnerability Assessments
7 Lectures 54:56
Vulnerability Assessment - Nessus
14:28

Vulnerability Assessment - OpenVAS
16:25

Vulnerability Assessment - Nikto
04:41

Quick findings of web apps vulnerabilities
02:04


ZAP scan analysis
05:23

Web application scanning - AppSpider_pro
07:15
+
Vulnerability to Exploitation - Exploiting the targets
5 Lectures 43:31
Metasploit Commanding
09:03

Metasploit - Exploiting MS08-067
08:44

Metasploit - Exploiting web apps
07:31

Binary Exploitation - Buffer overflow attack
08:42

Browser Exploitation with BeEF
09:31
+
Web application Penetration testing - Exploitation
4 Lectures 28:07
Exploiting SQL Injection
08:33

Cross Site Scripting attacks - XSS
05:13

Cross Site Request Forgery attack - CSRF
06:00

Fuzzing Input fields
08:21
+
Wireless Network Hacking
1 Lecture 06:48
WPA/WPA2 Cracking ( wireless security testing )
06:48
+
Post Exploitation attacks - Lateral Moving in Networks
5 Lectures 19:14
First post Responder
05:31

Adding user account to target machine
02:25

Creating persistent backdoor on target machine
03:30


Dumping cached credentials ( last 10 passwords )
01:59
6 More Sections
About the Instructor
Atul Tiwari
4.2 Average rating
368 Reviews
30,608 Students
2 Courses
Ethical hacker | Security Evangelist | Penetration Tester

Security Analyst | IT AUDITOR | Cyber laws expert | Author | Public speaker | CISSP

Having more than 10 years of working experience in information security field.

Have trained more than 35000 students on the topic of Information security & penetration testing in classroom mode and online across 162 countries. with expertise in web application penetration testing, i have performed several penetration tests and security audits, security analysis with private, governments and security agencies to help assist with to cope with cyber threats.