Course Overview
This course has been designed so students from non-technical background can learn with ease and use these skills to be a good Penetration Tester.
The course has been developed by myself after several research and development projects. This 100% practical course is for anyone wanting to be a competent Information Security Professional and Penetration Tester.
What you'll learn
- Perform penetration testing computers, networks, web apps and secure computers and networks by exposing vulnerabilities...
- Discover and exploit what a modern penetration tester does.
- Penetrate and Exploit even highly secured environments Effectively execute modern attack techniques Use commercial / ope...
- Hack from real world tools, scripts on your own
- Develop strategies for communicating risk that impacts an organization's security posture Ethical hacking and penetratio...
Requirements
- Basic IT Skills.
- No Linux, programming or hacking knowledge required.
- Computer with a minimum of 4GB ram/memory.
- Operating System: Windows / OS X / Linux.
Example Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 1- Privilege Escalation For Windows - Part (1) (96:04)
- 2- Privilege Escalation For Windows - Part (2) (75:25)
- - Privilege Escalation For Windows
- 3- Privilege Escalation For Linux (98:29)
- - Privilege Escalation For Linux
- 4- SSH Tunneling & AV Evasion & Password Attacks (94:58)
- Pivoiting
- 5- HTB Machine (Open Admin) (65:29)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 1- How Web Application Works (81:24)
- 2- Web Recon & Mapping (93:48)
- - Web Recon & Mapping
- 3- Remote & Local File Inclusion Attacks (94:15)
- - Remote & Local File Inclusion Attacks
- 4- File Upload & OS Command Injection (76:38)
- - File Upload & OS Command Injection
- 5- SQL Injection Attacks (86:55)
- - SQL Injection Attacks
- 6- XSS Attacks (78:06)
- 7- Bonus XSS Lecture (67:33)
- - XSS Attacks
- 8- Authorization & Authentication Attacks (80:17)
- - Authorization & Authentication Attacks
- 9- CSRF Attacks & CMS Pen Testing (79:17)
- - CSRF Attacks & CMS Pen Testing