3.2  23 reviews on Udemy

Become a Professional Penetration Tester

If you want to continue your career as an information security expert and pentester ,you are right place.
Course from Udemy
 2234 students enrolled
 en
Answers to every single question you have about ethical hacking and penetration testing from an experienced IT professional!
Tips for remaining anonymous in hacking and penetration testing activities.
You Will Learn What is Pentest
A complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords.
You Will Learn How To Become a Pentester
You will learn Kali Linux OS
You will learn Metasploit framework
You Will Learn Meterpreter
You Will Learn Ethical Hacking Methods
You Will have Your Own Pentest Lab Environment
You will learn exploiting a vulnerability with Metasploit framework
You will learn Arp poisoning attack
You will have A-lot of real life pentest Scenario videos
You Will Learn Hacking Linux And Windows
You Will Learn Post Exploitation Methods
You Will learn All of Network Pivoting Methods

LINUX FUNDAMENTALS

VMWARE PLAYER INSTALLATION

KALI LINUX INSTALLATION

LINUX NETWORK CONFIGURATION

LINUX BASIC COMMANDS

LINUX DIRECTORY STRUCTURE


NETWORK FUNDAMENTALS

NETWORK BASICS

NETWORK DEVICES

OSI MODELS

TCP/IP



WHAT IS HACKER , WHITE HACKER AND PENTEST?

PENTEST

 

 

TOR NETWORK

TOR NETWORK & USING NMAP, SQLMAP AND METASPLOIT WITH TOR & WHONIX ANONYMOUS OPERATING SYSTEM

 

 

INFORMATION GATHERING ABOUT TARGET SYSTEM

RECONNAISSANCE AND VULNERABILITY SCANNING AT PENETRATION TEST

NMAP GUIDE

PENTEST SCENARIO -1

PENTEST SCENARIO -2

NESSUS VULNERABILITY SCANNER

 

 

METASPLOITE

METASPLOITE GUIDE

MAKE UNDETECTABLE MALWARE WITH METASPLOITE

MAKE UNDETECTABLE PHP AND ASP SHELL

MAKE AN INFECTED PDF FILE

PENTEST SCENARIO -3

PENTEST SCENARIO -4

PENTEST SCENARIO -5

PENTEST SCENARIO -6

 

 

WEB APPLICATION ATTACKS

WEB FUNDAMENTALS

WEB APPLICATION SECURITY

HTTP BASIC AUTHENTICATION DICTIONARY ATTACK WITH BURPSUITE

BRUTE FORCE TO WEB FORM BASED AUTHENTICATION WITH FIREFORCE

DICTIONARY ATTACK TO FORM BASED AUTHENTICATION WITH BURPSUITE

CROSS SITE SCRIPTING(XSS)

BEEF – THE BROWSER EXPLOTION FRAMEWORK PROJECT

SQL INJECTION

STEP BY STEP SQL INJECTION ATTACK – DEMO 1

STEP BY STEP SQL INJECTION ATTACK – DEMO 2

AUTHENTICATION BYPASS WITH SQL INJECTION

SQLMAP

SQL INJECTION THROUGH LIVE HTTP HEADERS & BYPASS CLIENT SIDE SECURTY PROTECT

LOCAL FILE INCLUSION EXPLOITATION

REMOTE FILE INCLUSION (RFI)

DIRECTORY THAVERSAL ATTACK

CSRF(CROSS SITE REQUEST FORGERY)

FINDING TARGET WEB SERVER INFORMATIONS

OWASP-ZAP OPEN SOURCE WEB APPLICATION SECURITY SCANNER

W3AF OPEN SOURCE WEP APPLICATION SECURITY SCANNER

 

 

SOCIAL ENGINEERING ATTACKS

SETOOLKIT

MALWARE INFECTED WORD FILE

 

LOCAL NETWORK ATTACKS

MAN IN THE MIDDLE ATTACK(MITM)

 

DECRYPTION METHODS

CREATE WORDLIST WITH CRUNCH

PASSWORD HASH CRACKING – OFFLINE CRACKING ATTACKS

BRUTE FORCING PASSWORD WITH MEDUSA, HYDRA AND NCRACK(ONLINE PASSWORD ATTACKS)

 

 

WIRELESS HACKING

CONFIGURE WIFI ADAPTOR TO MONITORING MODE

EASY-CREDS FAKE ACCESS POINT ATTACK

CRACKING WEP PASSWORDS WITH AIRCRACK-NG

CRACKING WPA/WPA2 PASSWORDS WITH AIRCRACK-NG

HACK WIFI BY WPS PIN ATTACK

CRACKING WPA HANDSHAKE BY PYRIT MORE QUICKLY

CRACK PASSWORD HASHES WITH OCLHASHCAT PROGRAM

EVIL TWIN ATTACK ( HACK WPA/WPA2 WITHOUT USING BRUTE FORCE OR DICTIONARY ATTACK)

 

 

DDOS ATTACKS

DISTRIBUTED DENIAL OF SERVICE ATTACK (DDOS)

SYN FLOOD ATTACK

UDP FLOOD & DNS FLOOD & DNS AMPLIFICATION ATTACKS

HTTP FLOOD ATTACK

Become a  Professional Penetration Tester
$ 19.99
per course
Also check at

FAQs About "Become a Professional Penetration Tester"

About

Elektev is on a mission to organize educational content on the Internet and make it easily accessible. Elektev provides users with online course details, reviews and prices on courses aggregated from multiple online education providers.
DISCLOSURE: This page may contain affiliate links, meaning when you click the links and make a purchase, we receive a commission.

SOCIAL NETWORK