Learn Ethical Web Hacking, Bug Bounty, Web Penetration, Penetration Testing and prevent vulnerabilities with this course.
Penetration Testing skills make you a more marketable IT tech. This course considers you have no-prior knowledge in Penetration Testing/hacking. This course will take you from a beginner to a more advanced level with hands-on examples and by the end of this course, you'll be able to hack any system like Windows/Linux/Android and become an expert ethical hacker and keep yourself secured like Information security experts!
Penetration testing is also known as pen testing or ethical hacking. It describes the intentional launching of simulated cyberattacks that seek out exploitable vulnerabilities in computer systems, networks, websites, and applications. This course is practical but it will not ignore the theory. We will start with Kali Linux basics, then will try to make you comfortable with the Linux environment. Then we will learn how to install the needed software (VirtualBox, Kali Linux, Metasploitable2, Windows 10) as virtual machines then we will start the Penetration Testing/hacking with the complete Penetration testing process from Information gathering to exploitation, maintaining access to clearing logs and Final report generation with impact and remediation.
Note: This course is created for educational purposes and all the information learned should be used when the attacker is authorized. All the attacks are launched in our own lab or against systems that I have permission to test.
What you’ll learn:
What is Penetration Testing
Why perform a Penetration Test?
Need to know basic terms
Difference between Vulnerability Assessments vs Penetration Test
Types of Penetration Testing
Based on knowledge of the target
Based on the position of tester
Based on where it is performed
Penetration Testing Process steps
How to create Penetration Testing Lab Setup | Lab Environment
How to Create Penetration Testing Environment - Lab Setup
How to Install VirtualBox - Lab Setup
How to Install Kali Linux - Lab Setup
How to Install Metasploitable2 - Lab Setup
How to Install Windows - Lab Setup
Basic commands - Linux for Beginners | Practical Labs
Learn basic commands - Linux for Beginners | Lab
Reconnaissance and Planning | Penetration Testing | Practical Labs
Introduction to Reconnaissance and Planning
What is Passive Reconnaissance | Lab
Whois and domain information | Lab
Email harvesting | Lab
Website source code and Website mirroring | Lab
Find Social Media accounts - Information gathering | Lab
Information gathering through Job posting and Resumes | Lab
How to identify Web Application Firewall | Lab
OSINT Framework
Scanning and Discovery | Penetration Testing | Practical Labs
What is Active Reconnaissance
TCP 3-Way Handshake and TCP Flags
Active Reconnaissance -Tools
Active Reconnaissance -LAB Scenario
NMAP LAB over the internet | Lab
NMAP LAB on Local Network | Lab
NMAP LAB -Vulnerability scanning using scripts | Lab
Exploitation | Penetration Testing | Practical Labs
Exploiting FTP Port 21 | Kali Linux - Metasploitable2 | Lab
Exploiting SSH 22 | Kali Linux - Metasploitable2 | Lab
Exploiting Telnet 23 | Kali Linux - Metasploitable2 | Lab
Exploiting SMTP Port 25 | Kali Linux - Metasploitable2 | Lab
Exploiting HTTP Port 80 | Kali Linux - Metasploitable2 | Lab
Exploiting SMB 139 and 445 | Kali Linux - Metasploitable2 | Lab
Exploiting BindShell Port 1524 | Kali Linux - Metasploitable2 | Lab
Exploiting MySQL port 3306 | Kali Linux - Metasploitable2 | Lab
Exploiting VNC port 5900 | Kali Linux - Metasploitable2 | Lab
Exploiting Tomcat port 8180 | Kali Linux - Metasploitable2 | Lab
Exploiting Windows 10 | Kali Linux - Windows | Lab
Exploiting Linux | Kali Linux - Linux | Lab
Maintaining Access | Penetration Testing | Practical Labs
Maintaining Access
How to create backdoor for Windows | Kali Linux - Windows | Lab
How to hack any Android Phone | Kali Linux - Android | Lab
Clearing Tracks | Penetration Testing | Practical Labs
How to clear tracks
Clearing Tracks on Windows | Lab
Clearing Tracks on Linux | Lab
Report Generation | Penetration Testing
Report Generation with impact and remediation
Anyone loves hacking
Hackers
Penetration testers
Ethical hackers
Freelancers
Developers