Whitehat Hacking and Penetration Testing Tutorial Video

Learn how to test and protect your network using Ethical Hacking and Penetration Testing Techniques.
4.1 (191 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
7,888 students enrolled
$50
Take This Course
  • Lectures 101
  • Contents Video: 10.5 hours
  • Skill Level All Levels
  • Languages English, captions
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 10/2012 English Closed captions available

Course Description

In this Ethical Hacking - Whitehat Hacking and Penetration testing tutorial, expert ethical hacker Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks.

Some of the topics covered in this course are; researching and background information retrieval, networking fundamentals, a deeper look at TCP/IP and packets, as well as understanding cryptography. You will learn about scanning networks, penetration testing and the use of Metasploit, malware and viruses, DoS and DDoS attacks, web application hacking and securing wireless networks. Finally, you will learn about detection evasion and preventing programming attacks, and much more throughout this video based tutorial.

By the time you have completed this video tutorial for Whitehat Hacking and Penetration testing, you will have a deeper understanding of the areas you may be potentially be vulnerable to attack in, as well as the methods that hackers use to exploit your systems, allowing you to better understand how to secure your hardware and data from unethical hackers.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: 01. Introduction
0101 What You Should Expect From The Video
Preview
04:12
0102 What Is Hacking?
Preview
03:28
0104 Types Of Hacking
Preview
06:05
0105 Being Ethical
03:24
0106 Legal Issues Around Hacking
06:30
0107 Methodology
06:56
0108 Types Of Attacks
08:19
0109 Skills Necessary And Skills To Be Learned
06:03
0110 What Is Penetration Testing/Scope?
08:38
Section 2: 02. Getting The Background - Footprinting And Reconnaissance
0201 What Is Footprinting?
04:15
0202 History Lessons - Way Back Machine
05:37
0203 Using Your Resources - Job Listings, People Searches, Social Networks
04:41
0204 Using Whois Lookups
06:35
0205 Using DNS To Extract Information:
07:07
0206 Finding Network Ranges
05:15
0208 Mining For Information Using Google Hacking
05:05
0207 Google Hacking
03:41
0209 Google Hacking Database
04:43
Section 3: 03. Networking Fundamentals
0301 History Of TCP/IP
07:06
0302 Using Wireshark To Examine Packets
05:40
0303 OSI And IP Models
08:46
0304 Addressing
03:43
0305 UDP
05:14
0306: TCP
08:06
0307: Services
05:46
0308: Using Wireshark For Deep Analysis
08:44
0309: DHCP
09:23
0310: Using ARP
09:34
Section 4: 04. Cryptography
0401 History Of Cryptography
07:25
0402: Types Of Cryptography
07:02
0403 Public Key
04:35
0404 Certificates
08:18
0405 Hashing
05:35
0406 AES, DES, 3DES
05:53
0407 SSL/TLS
07:46
0408 SSH
06:55
0409 Disk Encryption :
04:19
0410 Cryptographic Analysis
03:43
Section 5: 05. Scanning And Enumeration
0501 Types of Scans:
07:45
0502 Using NMAP
03:48
0503 Other Types Of Scans :
07:04
0504 Using hping And Its Uses
06:28
0505 War Dialing
03:54
0506 IDS Evasion
06:53
0507 Banner Grabbing
08:42
0508 Vulnerability Scanning
05:50
0509 Using Nessus
08:55
0510 Enumeration Techniques
06:46
0511 SNMP
09:06
0512 LDAP
08:40
0513 Using Proxies
05:43
0514 Tor And Anonymizers
05:19
0515 Tunneling
06:39
Section 6: 06. Penetration
0601 Goals
07:49
0602 Password Cracking And Complexity
07:11
0603 Password Attacks
05:42
0604 Password Storage Techniques
04:34
0605 Privilege Escalation
06:13
0606 Spyware, Rootkits And Key Loggers
07:52
0607 Metasploit Basics
04:55
0608 Auditing/Logging
08:04
0609 Metasploit Again
04:24
Section 7: 07. Malware - Trojans, Backdoors, Viruses And Worms
0701 Definitions And History :
05:04
0702 Detection Of Malware :
06:19
0703 Anti-Virus Evasion :
04:32
0704 Deployment Of Malware :
04:58
0705 Virus Types :
06:05
0706 Malware Analysis :
06:00
0707 Windows ADS And Hiding Malware :
05:41
0708 Doing Debugging - OllyDbg :
09:00
0709 Packing And Automated A/V Maker Tools :
03:37
0710 More Malware Analysis :
06:06
Section 8: 08. Denial Of Service Attacks
0801 What Is DoS? DDoS?
04:51
0802 DoS Attacks
06:04
0803 Cyber Crime
06:48
0804 Botnets
06:58
0805 Attack Countermeasures - Flooding
08:56
Section 9: 09. Web Application Hacking
0901 What Is Web Application Testing?
04:56
0902 Web Application Architecture
05:13
0903 Web Testing Tools
05:25
0904 Cross Site Scripting
04:13
0905 SQL Injection
05:01
0906 Cross Site Request Forgery
04:52
0907 Session Hijacking And Attacks And Cookies
06:56
0908 Password Attacks
05:25
0909 Encoding
03:48
Section 10: 10. Wireless Networking
1001 Wireless Networking
04:56
1002 Encryption Techniques - WEP, WPA, WPA2
06:43
1003 Finding Hotspots
07:22
1004 Breaking WEP Encryption
06:41

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Infinite Skills, High Quality Training

Infinite Skills is a Canadian based company who offer a huge and ever growing range of high quality eLearning solutions that teach using studio quality narrated videos backed-up with practical hands-on examples and comprehensive working files. All courses are created by trained educators and experts in video based education.

The emphasis is on teaching real life skills that are essential for progressing in today's commercial environment.

Ready to start learning?
Take This Course