Whitehat Hacking and Penetration Testing Tutorial Video
4.6 (229 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
8,102 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Whitehat Hacking and Penetration Testing Tutorial Video to your Wishlist.

Add to Wishlist

Whitehat Hacking and Penetration Testing Tutorial Video

Learn how to test and protect your network using Ethical Hacking and Penetration Testing Techniques.
4.6 (229 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
8,102 students enrolled
Created by Infinite Skills
Last updated 11/2012
English
English
Current price: $10 Original price: $50 Discount: 80% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 10.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Description

In this Ethical Hacking - Whitehat Hacking and Penetration testing tutorial, expert ethical hacker Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks.

Some of the topics covered in this course are; researching and background information retrieval, networking fundamentals, a deeper look at TCP/IP and packets, as well as understanding cryptography. You will learn about scanning networks, penetration testing and the use of Metasploit, malware and viruses, DoS and DDoS attacks, web application hacking and securing wireless networks. Finally, you will learn about detection evasion and preventing programming attacks, and much more throughout this video based tutorial.

By the time you have completed this video tutorial for Whitehat Hacking and Penetration testing, you will have a deeper understanding of the areas you may be potentially be vulnerable to attack in, as well as the methods that hackers use to exploit your systems, allowing you to better understand how to secure your hardware and data from unethical hackers.

Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 101 Lectures Collapse All 101 Lectures 10:15:57
+
01. Introduction
9 Lectures 53:35



0105 Being Ethical
03:24

0106 Legal Issues Around Hacking
06:30

0107 Methodology
06:56

0108 Types Of Attacks
08:19

0109 Skills Necessary And Skills To Be Learned
06:03

0110 What Is Penetration Testing/Scope?
08:38
+
02. Getting The Background - Footprinting And Reconnaissance
9 Lectures 46:59
0201 What Is Footprinting?
04:15

0202 History Lessons - Way Back Machine
05:37

0203 Using Your Resources - Job Listings, People Searches, Social Networks
04:41

0204 Using Whois Lookups
06:35

0205 Using DNS To Extract Information:
07:07

0206 Finding Network Ranges
05:15

0208 Mining For Information Using Google Hacking
05:05

0207 Google Hacking
03:41

0209 Google Hacking Database
04:43
+
03. Networking Fundamentals
10 Lectures 01:12:02
0301 History Of TCP/IP
07:06

0302 Using Wireshark To Examine Packets
05:40

0303 OSI And IP Models
08:46

0304 Addressing
03:43

0305 UDP
05:14

0306: TCP
08:06

0307: Services
05:46

0308: Using Wireshark For Deep Analysis
08:44

0309: DHCP
09:23

0310: Using ARP
09:34
+
04. Cryptography
10 Lectures 01:01:31
0401 History Of Cryptography
07:25

0402: Types Of Cryptography
07:02

0403 Public Key
04:35

0404 Certificates
08:18

0405 Hashing
05:35

0406 AES, DES, 3DES
05:53

0407 SSL/TLS
07:46

0408 SSH
06:55

0409 Disk Encryption :
04:19

0410 Cryptographic Analysis
03:43
+
05. Scanning And Enumeration
15 Lectures 01:41:32
0501 Types of Scans:
07:45

0502 Using NMAP
03:48

0503 Other Types Of Scans :
07:04

0504 Using hping And Its Uses
06:28

0505 War Dialing
03:54

0506 IDS Evasion
06:53

0507 Banner Grabbing
08:42

0508 Vulnerability Scanning
05:50

0509 Using Nessus
08:55

0510 Enumeration Techniques
06:46

0511 SNMP
09:06

0512 LDAP
08:40

0513 Using Proxies
05:43

0514 Tor And Anonymizers
05:19

0515 Tunneling
06:39
+
06. Penetration
9 Lectures 56:44
0601 Goals
07:49

0602 Password Cracking And Complexity
07:11

0603 Password Attacks
05:42

0604 Password Storage Techniques
04:34

0605 Privilege Escalation
06:13

0606 Spyware, Rootkits And Key Loggers
07:52

0607 Metasploit Basics
04:55

0608 Auditing/Logging
08:04

0609 Metasploit Again
04:24
+
07. Malware - Trojans, Backdoors, Viruses And Worms
10 Lectures 57:22
0701 Definitions And History :
05:04

0702 Detection Of Malware :
06:19

0703 Anti-Virus Evasion :
04:32

0704 Deployment Of Malware :
04:58

0705 Virus Types :
06:05

0706 Malware Analysis :
06:00

0707 Windows ADS And Hiding Malware :
05:41

0708 Doing Debugging - OllyDbg :
09:00

0709 Packing And Automated A/V Maker Tools :
03:37

0710 More Malware Analysis :
06:06
+
08. Denial Of Service Attacks
5 Lectures 33:37
0801 What Is DoS? DDoS?
04:51

0802 DoS Attacks
06:04

0803 Cyber Crime
06:48

0804 Botnets
06:58

0805 Attack Countermeasures - Flooding
08:56
+
09. Web Application Hacking
9 Lectures 45:49
0901 What Is Web Application Testing?
04:56

0902 Web Application Architecture
05:13

0903 Web Testing Tools
05:25

0904 Cross Site Scripting
04:13

0905 SQL Injection
05:01

0906 Cross Site Request Forgery
04:52

0907 Session Hijacking And Attacks And Cookies
06:56

0908 Password Attacks
05:25

0909 Encoding
03:48
+
10. Wireless Networking
7 Lectures 42:00
1001 Wireless Networking
04:56

1002 Encryption Techniques - WEP, WPA, WPA2
06:43

1003 Finding Hotspots
07:22

1004 Breaking WEP Encryption
06:41

1005 Rogue Access Points And Attacks
04:52

1006 Wireless Sniffing
04:44

1007 Protecting Wireless Networks
06:42
2 More Sections
About the Instructor
Infinite Skills
4.4 Average rating
38,172 Reviews
689,504 Students
331 Courses
High Quality Training

Infinite Skills is a Canadian based company who offer a huge and ever growing range of high quality eLearning solutions that teach using studio quality narrated videos backed-up with practical hands-on examples and comprehensive working files. All courses are created by trained educators and experts in video based education.

The emphasis is on teaching real life skills that are essential for progressing in today's commercial environment.